ed of signal 17 D0712 20:23:43.256385 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.256394 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.256465 30210 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.257167 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.258901 30210 syscalls.go:262] [ 603: 603] Allocating stack with size of 8388608 bytes D0712 20:23:43.259016 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.260385 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.260436 30210 usertrap_amd64.go:106] [ 603: 603] Map a usertrap vma at 67000 D0712 20:23:43.260579 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 1 D0712 20:23:43.260654 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:43.261067 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.261092 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 2 D0712 20:23:43.261101 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:43.261726 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.261763 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 3 D0712 20:23:43.261776 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:43.267650 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.267679 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 4 D0712 20:23:43.267691 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:43.269185 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.269212 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 5 D0712 20:23:43.269225 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:43.269327 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.269344 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 6 D0712 20:23:43.269354 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:43.269678 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.269702 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 7 D0712 20:23:43.269709 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:43.269962 30210 usertrap_amd64.go:212] [ 603: 604] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.269992 30210 usertrap_amd64.go:122] [ 603: 604] Allocate a new trap: 0xc000a78ff0 8 D0712 20:23:43.270001 30210 usertrap_amd64.go:225] [ 603: 604] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:43.270450 30210 usertrap_amd64.go:212] [ 603: 604] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.270482 30210 usertrap_amd64.go:122] [ 603: 604] Allocate a new trap: 0xc000a78ff0 9 D0712 20:23:43.270494 30210 usertrap_amd64.go:225] [ 603: 604] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:43.270525 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.270533 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 10 D0712 20:23:43.270540 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:43.281100 30210 usertrap_amd64.go:212] [ 603: 604] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.281172 30210 usertrap_amd64.go:122] [ 603: 604] Allocate a new trap: 0xc000a78ff0 11 D0712 20:23:43.281194 30210 usertrap_amd64.go:225] [ 603: 604] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:43.281259 30210 usertrap_amd64.go:212] [ 603: 604] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.281276 30210 usertrap_amd64.go:122] [ 603: 604] Allocate a new trap: 0xc000a78ff0 12 D0712 20:23:43.281283 30210 usertrap_amd64.go:225] [ 603: 604] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:43.281302 30210 task_signals.go:470] [ 603: 603] Notified of signal 23 D0712 20:23:43.281395 30210 task_signals.go:220] [ 603: 603] Signal 23: delivering to handler D0712 20:23:43.281805 30210 task_signals.go:470] [ 603: 603] Notified of signal 23 D0712 20:23:43.281871 30210 task_signals.go:220] [ 603: 603] Signal 23: delivering to handler D0712 20:23:43.284275 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.284299 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 13 D0712 20:23:43.284311 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:43.293217 30210 task_signals.go:470] [ 603: 603] Notified of signal 23 D0712 20:23:43.293295 30210 task_signals.go:220] [ 603: 603] Signal 23: delivering to handler D0712 20:23:43.293440 30210 task_signals.go:470] [ 603: 603] Notified of signal 23 D0712 20:23:43.295081 30210 task_signals.go:220] [ 603: 603] Signal 23: delivering to handler D0712 20:23:43.295440 30210 usertrap_amd64.go:212] [ 603: 603] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.295479 30210 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000a78ff0 14 D0712 20:23:43.295493 30210 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:43.295568 30210 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.295595 30210 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.295622 30210 task_signals.go:204] [ 603: 604] Signal 603, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.295645 30210 task_signals.go:204] [ 603: 606] Signal 603, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.295656 30210 task_signals.go:204] [ 603: 607] Signal 603, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.295655 30210 task_signals.go:204] [ 603: 605] Signal 603, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.295669 30210 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.295691 30210 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.295715 30210 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.295732 30210 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.295752 30210 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.295768 30210 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.295775 30210 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.295782 30210 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.295785 30210 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.295796 30210 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.297049 30210 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.297156 30210 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.297253 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.297326 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.297337 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.297484 30210 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.299391 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.300832 30210 syscalls.go:262] [ 608: 608] Allocating stack with size of 8388608 bytes D0712 20:23:43.301020 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.302324 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.302379 30210 usertrap_amd64.go:106] [ 608: 608] Map a usertrap vma at 6a000 D0712 20:23:43.302456 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 1 D0712 20:23:43.302490 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:43.303116 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.303145 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 2 D0712 20:23:43.303158 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:43.303846 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.303882 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 3 D0712 20:23:43.303895 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:43.310248 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.310279 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 4 D0712 20:23:43.310289 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:43.311685 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.311721 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 5 D0712 20:23:43.311735 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:43.311803 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.311818 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 6 D0712 20:23:43.311824 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:43.312176 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.312208 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 7 D0712 20:23:43.312220 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:43.312547 30210 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.312639 30210 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc000a79080 8 D0712 20:23:43.312890 30210 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:43.313017 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.313027 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 9 D0712 20:23:43.313037 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:43.313208 30210 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.313275 30210 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc000a79080 10 D0712 20:23:43.313379 30210 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:43.314029 30210 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.314054 30210 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc000a79080 11 D0712 20:23:43.314063 30210 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:43.314077 30210 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.314081 30210 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc000a79080 12 D0712 20:23:43.314086 30210 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:43.314098 30210 task_signals.go:470] [ 608: 608] Notified of signal 23 D0712 20:23:43.314147 30210 task_signals.go:220] [ 608: 608] Signal 23: delivering to handler D0712 20:23:43.322130 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.322168 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 13 D0712 20:23:43.322184 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:43.325652 30210 task_signals.go:470] [ 608: 608] Notified of signal 23 D0712 20:23:43.325716 30210 task_signals.go:220] [ 608: 608] Signal 23: delivering to handler I0712 20:23:43.334509 30210 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0712 20:23:43.334602 30210 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.334613 30210 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc000a79080 14 D0712 20:23:43.334625 30210 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:43.334694 30210 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.334731 30210 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.334753 30210 task_signals.go:204] [ 608: 610] Signal 608, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.334746 30210 task_signals.go:204] [ 608: 611] Signal 608, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.334749 30210 task_signals.go:204] [ 608: 612] Signal 608, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.334767 30210 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.334803 30210 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.334825 30210 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.334861 30210 task_signals.go:204] [ 608: 609] Signal 608, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.334900 30210 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.334913 30210 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.334919 30210 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.334931 30210 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.334939 30210 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.334945 30210 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.334957 30210 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.336307 30210 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.336339 30210 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.336383 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.336423 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.336445 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.336561 30210 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.337316 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.338913 30210 syscalls.go:262] [ 613: 613] Allocating stack with size of 8388608 bytes D0712 20:23:43.339115 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.340344 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.340394 30210 usertrap_amd64.go:106] [ 613: 613] Map a usertrap vma at 66000 D0712 20:23:43.340501 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 1 D0712 20:23:43.340582 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:43.341574 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.341602 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 2 D0712 20:23:43.341612 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:43.342099 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.342119 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 3 D0712 20:23:43.342128 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:43.349148 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.349171 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 4 D0712 20:23:43.349183 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:43.352038 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.352070 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 5 D0712 20:23:43.352083 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:43.352138 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.352146 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 6 D0712 20:23:43.352154 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:43.352354 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.352378 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 7 D0712 20:23:43.352390 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:43.352557 30210 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.352579 30210 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001232e10 8 D0712 20:23:43.352589 30210 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:43.352783 30210 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.352812 30210 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001232e10 9 D0712 20:23:43.352823 30210 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:43.352972 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.352997 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 10 D0712 20:23:43.353083 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:43.360646 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.360672 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 11 D0712 20:23:43.360682 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:43.364051 30210 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.364080 30210 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001232e10 12 D0712 20:23:43.364112 30210 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:43.364146 30210 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.364154 30210 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001232e10 13 D0712 20:23:43.364163 30210 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:43.364238 30210 task_signals.go:470] [ 613: 613] Notified of signal 23 D0712 20:23:43.364315 30210 task_signals.go:220] [ 613: 613] Signal 23: delivering to handler I0712 20:23:43.370657 30210 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0712 20:23:43.370832 30210 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.370852 30210 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001232e10 14 D0712 20:23:43.370867 30210 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:43.370948 30210 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.371000 30210 task_signals.go:204] [ 613: 618] Signal 613, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.371026 30210 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.371061 30210 task_signals.go:204] [ 613: 615] Signal 613, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.371074 30210 task_signals.go:204] [ 613: 616] Signal 613, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.371080 30210 task_signals.go:204] [ 613: 614] Signal 613, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.371088 30210 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.371099 30210 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.371109 30210 task_signals.go:204] [ 613: 617] Signal 613, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.371139 30210 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.371146 30210 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.371156 30210 task_exit.go:204] [ 613: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.371165 30210 task_exit.go:204] [ 613: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.371172 30210 task_exit.go:204] [ 613: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.371195 30210 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.371203 30210 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.371214 30210 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.371238 30210 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.371246 30210 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.371257 30210 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.372389 30210 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.372424 30210 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.372435 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.372476 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.372507 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.372588 30210 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.373288 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.374652 30210 syscalls.go:262] [ 619: 619] Allocating stack with size of 8388608 bytes D0712 20:23:43.374812 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.376353 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.376387 30210 usertrap_amd64.go:106] [ 619: 619] Map a usertrap vma at 68000 D0712 20:23:43.376456 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 1 D0712 20:23:43.376483 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:43.376796 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.376827 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 2 D0712 20:23:43.376839 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:43.377563 30210 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0712 20:23:43.377586 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.377688 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 3 D0712 20:23:43.377703 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:43.383492 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.383518 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 4 D0712 20:23:43.383534 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:43.384667 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.384697 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 5 D0712 20:23:43.384709 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:43.384767 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.384782 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 6 D0712 20:23:43.384792 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:43.385107 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.385118 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 7 D0712 20:23:43.385127 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:43.385260 30210 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.385278 30210 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc0011a27b0 8 D0712 20:23:43.385288 30210 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:43.385428 30210 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.385451 30210 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc0011a27b0 9 D0712 20:23:43.385462 30210 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:43.385597 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.385617 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 10 D0712 20:23:43.385653 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:43.385756 30210 usertrap_amd64.go:212] [ 619: 622] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.385802 30210 usertrap_amd64.go:122] [ 619: 622] Allocate a new trap: 0xc0011a27b0 11 D0712 20:23:43.385829 30210 usertrap_amd64.go:225] [ 619: 622] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:43.386277 30210 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.386298 30210 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc0011a27b0 12 D0712 20:23:43.386306 30210 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:43.386320 30210 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.386324 30210 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc0011a27b0 13 D0712 20:23:43.386329 30210 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:43.386342 30210 task_signals.go:470] [ 619: 619] Notified of signal 23 D0712 20:23:43.386372 30210 task_signals.go:220] [ 619: 619] Signal 23: delivering to handler D0712 20:23:43.392325 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.392338 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 14 D0712 20:23:43.392346 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:43.396765 30210 task_signals.go:470] [ 619: 619] Notified of signal 23 D0712 20:23:43.397873 30210 task_signals.go:220] [ 619: 619] Signal 23: delivering to handler I0712 20:23:43.401295 30210 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0712 20:23:43.401415 30210 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.401467 30210 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc0011a27b0 15 D0712 20:23:43.401479 30210 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:43.401528 30210 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.401560 30210 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.401589 30210 task_signals.go:204] [ 619: 620] Signal 619, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.401612 30210 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.401619 30210 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.401633 30210 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.401614 30210 task_signals.go:204] [ 619: 623] Signal 619, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.401653 30210 task_signals.go:204] [ 619: 624] Signal 619, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.401666 30210 task_signals.go:204] [ 619: 622] Signal 619, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.401690 30210 task_signals.go:204] [ 619: 621] Signal 619, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.401689 30210 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.401736 30210 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.401754 30210 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.401770 30210 task_exit.go:204] [ 619: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.401784 30210 task_exit.go:204] [ 619: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.401788 30210 task_exit.go:204] [ 619: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.401796 30210 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.401801 30210 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.401805 30210 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.401817 30210 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.402798 30210 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.402819 30210 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.402833 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.402855 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.402866 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.402948 30210 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.403612 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.404862 30210 syscalls.go:262] [ 625: 625] Allocating stack with size of 8388608 bytes D0712 20:23:43.405039 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.406144 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.406173 30210 usertrap_amd64.go:106] [ 625: 625] Map a usertrap vma at 68000 D0712 20:23:43.406248 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 1 D0712 20:23:43.406274 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:43.406486 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.406518 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 2 D0712 20:23:43.406524 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:43.406913 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.406938 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 3 D0712 20:23:43.406948 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:43.412349 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.412422 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 4 D0712 20:23:43.412445 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:43.413514 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.413549 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 5 D0712 20:23:43.413563 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:43.413599 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.413619 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 6 D0712 20:23:43.413629 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:43.414608 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.414656 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 7 D0712 20:23:43.414679 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:43.414972 30210 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.415005 30210 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001233140 8 D0712 20:23:43.415018 30210 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:43.415222 30210 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.415253 30210 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001233140 9 D0712 20:23:43.415266 30210 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:43.415427 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.415444 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 10 D0712 20:23:43.415450 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:43.424718 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.424752 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 11 D0712 20:23:43.424775 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:43.425643 30210 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.425675 30210 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001233140 12 D0712 20:23:43.425688 30210 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:43.425724 30210 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.425744 30210 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001233140 13 D0712 20:23:43.425756 30210 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:43.425920 30210 task_signals.go:470] [ 625: 625] Notified of signal 23 D0712 20:23:43.427634 30210 task_signals.go:220] [ 625: 625] Signal 23: delivering to handler I0712 20:23:43.435825 30210 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0712 20:23:43.435903 30210 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.435912 30210 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001233140 14 D0712 20:23:43.435921 30210 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:43.435945 30210 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.435967 30210 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.435987 30210 task_signals.go:204] [ 625: 628] Signal 625, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.435983 30210 task_signals.go:204] [ 625: 627] Signal 625, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.436007 30210 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.436042 30210 task_signals.go:204] [ 625: 629] Signal 625, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.436068 30210 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.436079 30210 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.436071 30210 task_signals.go:204] [ 625: 626] Signal 625, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.436087 30210 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.436113 30210 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.436135 30210 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.436152 30210 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.436159 30210 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.436164 30210 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.436174 30210 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.437455 30210 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.437534 30210 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.437550 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.437590 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.437599 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.437681 30210 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.438645 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.440240 30210 syscalls.go:262] [ 630: 630] Allocating stack with size of 8388608 bytes D0712 20:23:43.440364 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.441978 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.442019 30210 usertrap_amd64.go:106] [ 630: 630] Map a usertrap vma at 66000 D0712 20:23:43.442113 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 1 D0712 20:23:43.442143 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:43.442581 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.442610 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 2 D0712 20:23:43.442637 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:43.443329 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.443358 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 3 D0712 20:23:43.443368 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:43.449970 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.450004 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 4 D0712 20:23:43.450014 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:43.451208 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.451238 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 5 D0712 20:23:43.451257 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:43.451321 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.451329 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 6 D0712 20:23:43.451342 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:43.451858 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.451887 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 7 D0712 20:23:43.451898 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:43.452140 30210 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.452170 30210 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a2a030 8 D0712 20:23:43.452182 30210 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:43.452470 30210 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.452546 30210 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a2a030 9 D0712 20:23:43.452600 30210 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:43.452626 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.452652 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 10 D0712 20:23:43.452663 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:43.460133 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.460155 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 11 D0712 20:23:43.460166 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:43.463680 30210 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.463711 30210 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a2a030 12 D0712 20:23:43.463724 30210 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:43.463804 30210 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.463809 30210 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a2a030 13 D0712 20:23:43.463814 30210 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:43.463869 30210 task_signals.go:470] [ 630: 630] Notified of signal 23 D0712 20:23:43.464055 30210 task_signals.go:220] [ 630: 630] Signal 23: delivering to handler I0712 20:23:43.470811 30210 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0712 20:23:43.470883 30210 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.470943 30210 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a2a030 14 D0712 20:23:43.470956 30210 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:43.471004 30210 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.471036 30210 task_signals.go:204] [ 630: 633] Signal 630, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.471072 30210 task_signals.go:204] [ 630: 635] Signal 630, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.471110 30210 task_signals.go:204] [ 630: 631] Signal 630, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.471115 30210 task_signals.go:204] [ 630: 634] Signal 630, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.471137 30210 task_signals.go:204] [ 630: 632] Signal 630, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.471175 30210 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.471199 30210 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.471215 30210 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.471228 30210 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.471240 30210 task_exit.go:204] [ 630: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.471262 30210 task_exit.go:204] [ 630: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.471270 30210 task_exit.go:204] [ 630: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.471298 30210 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.471334 30210 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.471342 30210 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.471363 30210 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.471389 30210 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.471397 30210 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.471408 30210 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.472628 30210 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.472664 30210 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.472680 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.472728 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.472746 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.472884 30210 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.473688 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.475046 30210 syscalls.go:262] [ 636: 636] Allocating stack with size of 8388608 bytes D0712 20:23:43.475210 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.476528 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.476563 30210 usertrap_amd64.go:106] [ 636: 636] Map a usertrap vma at 65000 D0712 20:23:43.476655 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 1 D0712 20:23:43.476682 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:43.477113 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.477136 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 2 D0712 20:23:43.477147 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:43.477640 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.477664 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 3 D0712 20:23:43.477675 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:43.483663 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.483700 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 4 D0712 20:23:43.483712 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:43.484908 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.484933 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 5 D0712 20:23:43.484971 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:43.485041 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.485054 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 6 D0712 20:23:43.485059 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:43.485314 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.485332 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 7 D0712 20:23:43.485339 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:43.485555 30210 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.485578 30210 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a79dd0 8 D0712 20:23:43.485588 30210 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:43.485698 30210 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.485718 30210 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a79dd0 9 D0712 20:23:43.485728 30210 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:43.485945 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.485975 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 10 D0712 20:23:43.485990 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:43.493090 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.493122 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 11 D0712 20:23:43.493134 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:43.497205 30210 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.497245 30210 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a79dd0 12 D0712 20:23:43.497258 30210 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:43.497307 30210 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.497332 30210 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a79dd0 13 D0712 20:23:43.497344 30210 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:43.497384 30210 task_signals.go:470] [ 636: 636] Notified of signal 23 D0712 20:23:43.497500 30210 task_signals.go:220] [ 636: 636] Signal 23: delivering to handler I0712 20:23:43.503616 30210 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0712 20:23:43.503706 30210 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.503720 30210 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a79dd0 14 D0712 20:23:43.503730 30210 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:43.503795 30210 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.503834 30210 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.503863 30210 task_signals.go:204] [ 636: 637] Signal 636, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.503887 30210 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.503896 30210 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.503919 30210 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.503940 30210 task_signals.go:204] [ 636: 638] Signal 636, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.503959 30210 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.503967 30210 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.503974 30210 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.503991 30210 task_signals.go:204] [ 636: 639] Signal 636, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.504015 30210 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.504022 30210 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.504027 30210 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.504043 30210 task_signals.go:204] [ 636: 640] Signal 636, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.504053 30210 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.504061 30210 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.504067 30210 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.504100 30210 task_signals.go:204] [ 636: 641] Signal 636, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.504119 30210 task_exit.go:204] [ 636: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.505229 30210 task_exit.go:204] [ 636: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.505261 30210 task_exit.go:204] [ 636: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.505278 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.505304 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.505313 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.505411 30210 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.506055 30210 task_stop.go:118] [ 7: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.507715 30210 syscalls.go:262] [ 642: 642] Allocating stack with size of 8388608 bytes D0712 20:23:43.507905 30210 task_stop.go:138] [ 7: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.509092 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.509167 30210 usertrap_amd64.go:106] [ 642: 642] Map a usertrap vma at 63000 D0712 20:23:43.509255 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 1 D0712 20:23:43.509273 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:43.509607 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.509625 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 2 D0712 20:23:43.509647 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:43.510201 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.510221 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 3 D0712 20:23:43.510235 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:43.515237 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.515263 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 4 D0712 20:23:43.515275 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:43.516290 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.516318 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 5 D0712 20:23:43.516327 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:43.516361 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.516387 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 6 D0712 20:23:43.516393 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:43.516689 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.516705 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 7 D0712 20:23:43.516711 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:43.516824 30210 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.516841 30210 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc001233d40 8 D0712 20:23:43.516847 30210 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:43.517141 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.517160 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 9 D0712 20:23:43.517169 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:43.517196 30210 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.517228 30210 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc001233d40 10 D0712 20:23:43.517240 30210 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:43.523564 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.523579 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 11 D0712 20:23:43.523637 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:43.529647 30210 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.529680 30210 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc001233d40 12 D0712 20:23:43.529693 30210 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:43.529821 30210 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.529854 30210 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc001233d40 13 D0712 20:23:43.529863 30210 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:43.529885 30210 task_signals.go:470] [ 642: 642] Notified of signal 23 D0712 20:23:43.529937 30210 task_signals.go:220] [ 642: 642] Signal 23: delivering to handler D0712 20:23:43.530178 30210 task_signals.go:470] [ 642: 642] Notified of signal 23 D0712 20:23:43.530214 30210 task_signals.go:220] [ 642: 642] Signal 23: delivering to handler D0712 20:23:43.533575 30210 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.533640 30210 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc001233d40 14 D0712 20:23:43.533657 30210 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:43.533725 30210 task_exit.go:204] [ 642: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.533802 30210 task_exit.go:204] [ 642: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.533850 30210 task_signals.go:204] [ 642: 644] Signal 642, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.533867 30210 task_exit.go:204] [ 642: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.533873 30210 task_exit.go:204] [ 642: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.533885 30210 task_exit.go:204] [ 642: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.533899 30210 task_signals.go:204] [ 642: 643] Signal 642, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.533906 30210 task_exit.go:204] [ 642: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.533912 30210 task_exit.go:204] [ 642: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.533917 30210 task_exit.go:204] [ 642: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.533950 30210 task_signals.go:204] [ 642: 645] Signal 642, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.533958 30210 task_exit.go:204] [ 642: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.533963 30210 task_exit.go:204] [ 642: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.533966 30210 task_exit.go:204] [ 642: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.533977 30210 task_signals.go:204] [ 642: 646] Signal 642, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.533983 30210 task_exit.go:204] [ 642: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.540162 30210 task_exit.go:204] [ 642: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.540226 30210 task_exit.go:204] [ 642: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.540249 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.540284 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.540297 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.540555 30210 task_exit.go:204] [ 642: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.540685 30210 task_signals.go:470] [ 7: 15] Notified of signal 23 D0712 20:23:43.540717 30210 task_signals.go:220] [ 7: 15] Signal 23: delivering to handler D0712 20:23:43.541381 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.542602 30210 syscalls.go:262] [ 647: 647] Allocating stack with size of 8388608 bytes D0712 20:23:43.542684 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.547071 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.547123 30210 usertrap_amd64.go:106] [ 647: 647] Map a usertrap vma at 63000 D0712 20:23:43.547239 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 1 D0712 20:23:43.547275 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:43.547793 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.547827 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 2 D0712 20:23:43.547841 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:43.548589 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.548614 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 3 D0712 20:23:43.548623 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:43.554338 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.554369 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 4 D0712 20:23:43.554379 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:43.555802 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.555832 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 5 D0712 20:23:43.555842 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:43.555917 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.555927 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 6 D0712 20:23:43.555936 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:43.556363 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.556381 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 7 D0712 20:23:43.556393 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:43.556557 30210 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.556580 30210 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0017acab0 8 D0712 20:23:43.556588 30210 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:43.556775 30210 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.556823 30210 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0017acab0 9 D0712 20:23:43.556837 30210 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:43.556904 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.556918 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 10 D0712 20:23:43.556928 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:43.564629 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.564660 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 11 D0712 20:23:43.564672 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:43.567259 30210 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.567316 30210 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0017acab0 12 D0712 20:23:43.567334 30210 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:43.567391 30210 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.567407 30210 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0017acab0 13 D0712 20:23:43.567414 30210 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:43.567435 30210 task_signals.go:470] [ 647: 647] Notified of signal 23 D0712 20:23:43.567520 30210 task_signals.go:220] [ 647: 647] Signal 23: delivering to handler I0712 20:23:43.576752 30210 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0712 20:23:43.576828 30210 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.576844 30210 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0017acab0 14 D0712 20:23:43.576856 30210 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:43.576879 30210 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.576905 30210 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.576928 30210 task_signals.go:204] [ 647: 648] Signal 647, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.576977 30210 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.576985 30210 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.576991 30210 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.577007 30210 task_signals.go:204] [ 647: 649] Signal 647, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.577022 30210 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.577028 30210 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.577033 30210 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.577055 30210 task_signals.go:204] [ 647: 650] Signal 647, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.577064 30210 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.577070 30210 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.577075 30210 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.577088 30210 task_signals.go:204] [ 647: 651] Signal 647, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.577095 30210 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.578231 30210 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.578260 30210 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.578271 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.581121 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.581161 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.581238 30210 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.581289 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:43.581404 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:43.581843 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.583223 30210 syscalls.go:262] [ 652: 652] Allocating stack with size of 8388608 bytes D0712 20:23:43.583315 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.585981 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.586063 30210 usertrap_amd64.go:106] [ 652: 652] Map a usertrap vma at 64000 D0712 20:23:43.586163 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 1 D0712 20:23:43.586209 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:43.586685 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.586717 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 2 D0712 20:23:43.586730 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:43.588435 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.588473 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 3 D0712 20:23:43.588486 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:43.595902 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.595944 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 4 D0712 20:23:43.595960 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:43.597618 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.597646 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 5 D0712 20:23:43.597659 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:43.597706 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.597712 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 6 D0712 20:23:43.597718 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:43.597876 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.597882 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 7 D0712 20:23:43.597886 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:43.598030 30210 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.598092 30210 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc001a2a480 8 D0712 20:23:43.598105 30210 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:43.598260 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.598284 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 9 D0712 20:23:43.598307 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:43.598386 30210 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.598396 30210 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc001a2a480 10 D0712 20:23:43.598405 30210 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:43.608766 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.608821 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 11 D0712 20:23:43.608840 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:43.619420 30210 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.619479 30210 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc001a2a480 12 D0712 20:23:43.619500 30210 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:43.619567 30210 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.619586 30210 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc001a2a480 13 D0712 20:23:43.619596 30210 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:43.619644 30210 task_signals.go:470] [ 652: 652] Notified of signal 23 I0712 20:23:43.619770 30210 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0712 20:23:43.619831 30210 task_signals.go:220] [ 652: 652] Signal 23: delivering to handler D0712 20:23:43.619947 30210 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.619969 30210 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc001a2a480 14 D0712 20:23:43.619983 30210 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:43.620055 30210 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.620079 30210 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.620109 30210 task_signals.go:204] [ 652: 655] Signal 652, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.620134 30210 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.620135 30210 task_signals.go:204] [ 652: 656] Signal 652, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.620143 30210 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.620171 30210 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.620110 30210 task_signals.go:204] [ 652: 654] Signal 652, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.620234 30210 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.620242 30210 task_signals.go:204] [ 652: 653] Signal 652, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.620278 30210 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.620315 30210 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.620362 30210 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.620387 30210 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.620394 30210 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.620409 30210 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.621933 30210 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.621955 30210 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.621965 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.622025 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.622057 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.622198 30210 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.622867 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.624349 30210 syscalls.go:262] [ 657: 657] Allocating stack with size of 8388608 bytes D0712 20:23:43.624453 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.625996 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.626049 30210 usertrap_amd64.go:106] [ 657: 657] Map a usertrap vma at 63000 D0712 20:23:43.626158 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 1 D0712 20:23:43.626195 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:43.626638 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.626669 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 2 D0712 20:23:43.626683 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:43.627275 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.627300 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 3 D0712 20:23:43.627311 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:43.633655 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.633694 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 4 D0712 20:23:43.633709 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:43.634965 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.634991 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 5 D0712 20:23:43.635006 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:43.635072 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.635081 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 6 D0712 20:23:43.635090 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:43.638277 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.638335 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 7 D0712 20:23:43.638358 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:43.638665 30210 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.638680 30210 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001b983f0 8 D0712 20:23:43.638694 30210 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:43.639705 30210 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.639747 30210 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001b983f0 9 D0712 20:23:43.639764 30210 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:43.639806 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.639826 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 10 D0712 20:23:43.639836 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:43.639960 30210 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.640001 30210 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001b983f0 11 D0712 20:23:43.640019 30210 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:43.649451 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.649483 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 12 D0712 20:23:43.649498 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:43.651969 30210 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.652008 30210 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001b983f0 13 D0712 20:23:43.652025 30210 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:43.652112 30210 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.652123 30210 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001b983f0 14 D0712 20:23:43.652131 30210 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:43.652252 30210 task_signals.go:470] [ 657: 657] Notified of signal 23 D0712 20:23:43.652349 30210 task_signals.go:220] [ 657: 657] Signal 23: delivering to handler I0712 20:23:43.660653 30210 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0712 20:23:43.660755 30210 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.660770 30210 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001b983f0 15 D0712 20:23:43.660785 30210 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:23:43.660867 30210 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.660914 30210 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.661030 30210 task_signals.go:204] [ 657: 659] Signal 657, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.661063 30210 task_signals.go:204] [ 657: 658] Signal 657, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.661084 30210 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.661081 30210 task_signals.go:204] [ 657: 660] Signal 657, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.661099 30210 task_signals.go:204] [ 657: 662] Signal 657, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.661155 30210 task_signals.go:204] [ 657: 661] Signal 657, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.661226 30210 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.661243 30210 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.661263 30210 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.661283 30210 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.661289 30210 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.661303 30210 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.661318 30210 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.661322 30210 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.661333 30210 task_exit.go:204] [ 657: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.661366 30210 task_exit.go:204] [ 657: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.661374 30210 task_exit.go:204] [ 657: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.661385 30210 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.676542 30210 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.676619 30210 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.676642 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.676710 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.676894 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.676762 30210 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.677730 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.679823 30210 syscalls.go:262] [ 663: 663] Allocating stack with size of 8388608 bytes D0712 20:23:43.679977 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.683200 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.683261 30210 usertrap_amd64.go:106] [ 663: 663] Map a usertrap vma at 66000 D0712 20:23:43.683347 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 1 D0712 20:23:43.683374 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:43.684299 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.684435 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 2 D0712 20:23:43.684524 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:43.685577 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.685601 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 3 D0712 20:23:43.685614 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:43.692843 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.692863 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 4 D0712 20:23:43.692875 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:43.694374 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.694432 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 5 D0712 20:23:43.694454 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:43.694564 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.694592 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 6 D0712 20:23:43.694603 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:43.695194 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.695214 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 7 D0712 20:23:43.695221 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:43.695404 30210 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.695441 30210 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001b98240 8 D0712 20:23:43.695458 30210 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:43.695670 30210 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.695708 30210 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001b98240 9 D0712 20:23:43.695722 30210 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:43.695823 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.695848 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 10 D0712 20:23:43.695858 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:43.704720 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.704753 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 11 D0712 20:23:43.704767 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:43.709513 30210 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.709559 30210 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001b98240 12 D0712 20:23:43.709578 30210 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:43.709626 30210 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.709635 30210 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001b98240 13 D0712 20:23:43.709646 30210 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:43.709669 30210 task_signals.go:470] [ 663: 663] Notified of signal 23 D0712 20:23:43.709860 30210 task_signals.go:220] [ 663: 663] Signal 23: delivering to handler D0712 20:23:43.716268 30210 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.716300 30210 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001b98240 14 D0712 20:23:43.716316 30210 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:43.716448 30210 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.716543 30210 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.716573 30210 task_signals.go:204] [ 663: 665] Signal 663, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.716589 30210 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.716597 30210 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.716602 30210 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.716618 30210 task_signals.go:204] [ 663: 664] Signal 663, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.716638 30210 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.716648 30210 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.716663 30210 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.716683 30210 task_signals.go:204] [ 663: 666] Signal 663, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.716694 30210 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.716701 30210 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.716707 30210 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.716720 30210 task_signals.go:204] [ 663: 667] Signal 663, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.716729 30210 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.718178 30210 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.718206 30210 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.718227 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.718262 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.718271 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.718327 30210 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.719003 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.720377 30210 syscalls.go:262] [ 668: 668] Allocating stack with size of 8388608 bytes D0712 20:23:43.720517 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.735646 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.735715 30210 usertrap_amd64.go:106] [ 668: 668] Map a usertrap vma at 62000 D0712 20:23:43.735812 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 1 D0712 20:23:43.735841 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:43.736311 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.736340 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 2 D0712 20:23:43.736350 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:43.737594 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.737674 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 3 D0712 20:23:43.737696 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:43.750594 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.750631 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 4 D0712 20:23:43.750644 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:43.751787 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.751828 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 5 D0712 20:23:43.751844 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:43.751903 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.751913 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 6 D0712 20:23:43.751932 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:43.752835 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.752862 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 7 D0712 20:23:43.752876 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:43.753131 30210 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.753149 30210 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc0002bff20 8 D0712 20:23:43.753160 30210 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:43.753408 30210 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.753456 30210 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc0002bff20 9 D0712 20:23:43.753467 30210 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:43.753539 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.753565 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 10 D0712 20:23:43.753577 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:43.753753 30210 usertrap_amd64.go:212] [ 668: 671] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.753820 30210 usertrap_amd64.go:122] [ 668: 671] Allocate a new trap: 0xc0002bff20 11 D0712 20:23:43.753856 30210 usertrap_amd64.go:225] [ 668: 671] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:43.761434 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.761476 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 12 D0712 20:23:43.761492 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:43.764820 30210 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.764874 30210 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc0002bff20 13 D0712 20:23:43.764895 30210 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:43.764932 30210 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.764968 30210 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc0002bff20 14 D0712 20:23:43.765002 30210 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:43.766474 30210 task_signals.go:470] [ 668: 668] Notified of signal 23 D0712 20:23:43.766544 30210 task_signals.go:220] [ 668: 668] Signal 23: delivering to handler D0712 20:23:43.772684 30210 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.772711 30210 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc0002bff20 15 D0712 20:23:43.772726 30210 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 20:23:43.772797 30210 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.772827 30210 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.772871 30210 task_signals.go:204] [ 668: 671] Signal 668, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.772880 30210 task_signals.go:204] [ 668: 672] Signal 668, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.772887 30210 task_signals.go:204] [ 668: 670] Signal 668, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.772872 30210 task_signals.go:204] [ 668: 669] Signal 668, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.772893 30210 task_exit.go:204] [ 668: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.772920 30210 task_exit.go:204] [ 668: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.772966 30210 task_exit.go:204] [ 668: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.772985 30210 task_exit.go:204] [ 668: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.773011 30210 task_exit.go:204] [ 668: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.773018 30210 task_exit.go:204] [ 668: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.773034 30210 task_exit.go:204] [ 668: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.773043 30210 task_exit.go:204] [ 668: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.773048 30210 task_exit.go:204] [ 668: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.773059 30210 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.774358 30210 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.774389 30210 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.774404 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.777056 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.777095 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.777163 30210 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.777915 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.779246 30210 syscalls.go:262] [ 673: 673] Allocating stack with size of 8388608 bytes D0712 20:23:43.779343 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.781625 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.781654 30210 usertrap_amd64.go:106] [ 673: 673] Map a usertrap vma at 69000 D0712 20:23:43.781731 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 1 D0712 20:23:43.781787 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:43.782336 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.782362 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 2 D0712 20:23:43.782374 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:43.784489 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.784514 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 3 D0712 20:23:43.784542 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:43.793558 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.793609 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 4 D0712 20:23:43.793624 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:43.795118 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.795244 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 5 D0712 20:23:43.795306 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:43.795523 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.795537 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 6 D0712 20:23:43.795546 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:43.795891 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.795961 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 7 D0712 20:23:43.796010 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:43.796270 30210 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.796285 30210 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc0011a2510 8 D0712 20:23:43.796297 30210 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:43.796494 30210 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.796515 30210 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc0011a2510 9 D0712 20:23:43.796525 30210 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:43.796554 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.796563 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 10 D0712 20:23:43.796571 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:43.804127 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.804179 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 11 D0712 20:23:43.804194 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:43.806691 30210 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.806728 30210 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc0011a2510 12 D0712 20:23:43.806744 30210 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:43.806821 30210 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.806857 30210 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc0011a2510 13 D0712 20:23:43.806875 30210 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:43.807003 30210 task_signals.go:470] [ 673: 673] Notified of signal 23 D0712 20:23:43.807098 30210 task_signals.go:220] [ 673: 673] Signal 23: delivering to handler D0712 20:23:43.815197 30210 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.815238 30210 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc0011a2510 14 D0712 20:23:43.815251 30210 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:43.815989 30210 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.816036 30210 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.816065 30210 task_signals.go:204] [ 673: 674] Signal 673, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.816082 30210 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.816090 30210 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.816096 30210 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.816112 30210 task_signals.go:204] [ 673: 675] Signal 673, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.816124 30210 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.816131 30210 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.816138 30210 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.816156 30210 task_signals.go:204] [ 673: 677] Signal 673, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.816182 30210 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.816191 30210 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.816197 30210 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.816210 30210 task_signals.go:204] [ 673: 676] Signal 673, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.816220 30210 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.817674 30210 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.817734 30210 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.817754 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.817799 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.817825 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.817915 30210 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.818560 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.820011 30210 syscalls.go:262] [ 678: 678] Allocating stack with size of 8388608 bytes D0712 20:23:43.820171 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.821962 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.822007 30210 usertrap_amd64.go:106] [ 678: 678] Map a usertrap vma at 60000 D0712 20:23:43.822105 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 1 D0712 20:23:43.822148 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:43.822450 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.822478 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 2 D0712 20:23:43.822492 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:43.822980 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.823004 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 3 D0712 20:23:43.823015 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:43.829091 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.829161 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 4 D0712 20:23:43.829249 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:43.830841 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.831106 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 5 D0712 20:23:43.831198 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:43.831571 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.831723 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 6 D0712 20:23:43.831740 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:43.832020 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.832044 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 7 D0712 20:23:43.832053 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:43.832513 30210 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.832527 30210 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc0003fe780 8 D0712 20:23:43.832558 30210 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:43.832855 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.832901 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 9 D0712 20:23:43.832920 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:43.832935 30210 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.832978 30210 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc0003fe780 10 D0712 20:23:43.832994 30210 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:43.840830 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.840852 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 11 D0712 20:23:43.840865 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:43.843433 30210 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.843471 30210 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc0003fe780 12 D0712 20:23:43.843484 30210 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:43.843526 30210 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.843558 30210 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc0003fe780 13 D0712 20:23:43.843566 30210 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:43.843614 30210 task_signals.go:470] [ 678: 678] Notified of signal 23 D0712 20:23:43.843662 30210 task_signals.go:220] [ 678: 678] Signal 23: delivering to handler D0712 20:23:43.852071 30210 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.852105 30210 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc0003fe780 14 D0712 20:23:43.852118 30210 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:43.852169 30210 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.852192 30210 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.852206 30210 task_signals.go:204] [ 678: 680] Signal 678, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.852217 30210 task_signals.go:204] [ 678: 681] Signal 678, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.852237 30210 task_signals.go:204] [ 678: 679] Signal 678, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.852245 30210 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.852274 30210 task_signals.go:204] [ 678: 682] Signal 678, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.852298 30210 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.852323 30210 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.852341 30210 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.852353 30210 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.852359 30210 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.852372 30210 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.852380 30210 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.852401 30210 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.852421 30210 task_signals.go:204] [ 678: 683] Signal 678, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.852433 30210 task_exit.go:204] [ 678: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.852440 30210 task_exit.go:204] [ 678: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.852446 30210 task_exit.go:204] [ 678: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.852455 30210 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.853882 30210 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.853919 30210 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.853948 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.854003 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.854029 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.854132 30210 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.854939 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.856378 30210 syscalls.go:262] [ 684: 684] Allocating stack with size of 8388608 bytes D0712 20:23:43.856649 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.859306 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.859341 30210 usertrap_amd64.go:106] [ 684: 684] Map a usertrap vma at 6a000 D0712 20:23:43.859411 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 1 D0712 20:23:43.859446 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:43.859764 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.859778 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 2 D0712 20:23:43.859787 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:43.861019 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.861058 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 3 D0712 20:23:43.861069 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:43.869780 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.869814 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 4 D0712 20:23:43.869827 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:43.870882 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.870913 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 5 D0712 20:23:43.870925 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:43.870977 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.870992 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 6 D0712 20:23:43.871001 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:43.871205 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.871228 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 7 D0712 20:23:43.871237 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:43.871429 30210 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.871451 30210 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0019723c0 8 D0712 20:23:43.871460 30210 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:43.871806 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.871839 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 9 D0712 20:23:43.871851 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:43.871879 30210 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.871894 30210 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0019723c0 10 D0712 20:23:43.871900 30210 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:43.872683 30210 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.872710 30210 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0019723c0 11 D0712 20:23:43.872722 30210 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:43.872764 30210 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.872772 30210 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0019723c0 12 D0712 20:23:43.872780 30210 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:43.872801 30210 task_signals.go:470] [ 684: 684] Notified of signal 23 D0712 20:23:43.872862 30210 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0712 20:23:43.879806 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.879845 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 13 D0712 20:23:43.879858 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:43.883420 30210 task_signals.go:470] [ 684: 684] Notified of signal 23 D0712 20:23:43.883480 30210 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0712 20:23:43.890341 30210 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.890400 30210 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0019723c0 14 D0712 20:23:43.890428 30210 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:43.890492 30210 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.890556 30210 task_signals.go:204] [ 684: 686] Signal 684, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.890587 30210 task_signals.go:204] [ 684: 685] Signal 684, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.890616 30210 task_signals.go:204] [ 684: 688] Signal 684, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.890625 30210 task_signals.go:204] [ 684: 687] Signal 684, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.890632 30210 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.890646 30210 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.890652 30210 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.890655 30210 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.890664 30210 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.890668 30210 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.890671 30210 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.890677 30210 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.890682 30210 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.890696 30210 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.890704 30210 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.891924 30210 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.891958 30210 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.891972 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.892011 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.892022 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.892230 30210 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.892834 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.894399 30210 syscalls.go:262] [ 689: 689] Allocating stack with size of 8388608 bytes D0712 20:23:43.894656 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.896083 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.896119 30210 usertrap_amd64.go:106] [ 689: 689] Map a usertrap vma at 68000 D0712 20:23:43.896204 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 1 D0712 20:23:43.896253 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:43.896534 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.896637 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 2 D0712 20:23:43.896663 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:43.897474 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.897503 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 3 D0712 20:23:43.897520 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:43.904293 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.904335 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 4 D0712 20:23:43.904350 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:43.905760 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.905792 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 5 D0712 20:23:43.905805 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:43.905910 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.905938 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 6 D0712 20:23:43.905951 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:43.906204 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.906221 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 7 D0712 20:23:43.906227 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:43.906350 30210 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.906374 30210 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc001972600 8 D0712 20:23:43.906394 30210 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:43.906602 30210 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.906628 30210 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc001972600 9 D0712 20:23:43.906635 30210 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:43.906647 30210 usertrap_amd64.go:212] [ 689: 692] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.906652 30210 usertrap_amd64.go:122] [ 689: 692] Allocate a new trap: 0xc001972600 10 D0712 20:23:43.906658 30210 usertrap_amd64.go:225] [ 689: 692] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:43.906845 30210 usertrap_amd64.go:212] [ 689: 693] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.906898 30210 usertrap_amd64.go:122] [ 689: 693] Allocate a new trap: 0xc001972600 11 D0712 20:23:43.906942 30210 usertrap_amd64.go:225] [ 689: 693] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:43.914061 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.914087 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 12 D0712 20:23:43.914097 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:43.917820 30210 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.917854 30210 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc001972600 13 D0712 20:23:43.917867 30210 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:43.917945 30210 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.917965 30210 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc001972600 14 D0712 20:23:43.917975 30210 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:43.918014 30210 task_signals.go:470] [ 689: 689] Notified of signal 23 D0712 20:23:43.918094 30210 task_signals.go:220] [ 689: 689] Signal 23: delivering to handler D0712 20:23:43.925367 30210 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.925424 30210 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc001972600 15 D0712 20:23:43.925446 30210 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:43.925508 30210 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.925537 30210 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.925574 30210 task_signals.go:204] [ 689: 690] Signal 689, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.925603 30210 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.925614 30210 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.925659 30210 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.925684 30210 task_signals.go:204] [ 689: 691] Signal 689, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.925696 30210 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.925703 30210 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.925711 30210 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.925727 30210 task_signals.go:204] [ 689: 692] Signal 689, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.925738 30210 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.925745 30210 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.925751 30210 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.925780 30210 task_signals.go:204] [ 689: 693] Signal 689, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.925802 30210 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.925811 30210 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.925845 30210 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.925879 30210 task_signals.go:204] [ 689: 694] Signal 689, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.925905 30210 task_exit.go:204] [ 689: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.927199 30210 task_exit.go:204] [ 689: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.927236 30210 task_exit.go:204] [ 689: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.927253 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.927297 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.927553 30210 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.928478 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.930174 30210 syscalls.go:262] [ 695: 695] Allocating stack with size of 8388608 bytes D0712 20:23:43.930394 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.931360 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.931416 30210 usertrap_amd64.go:106] [ 695: 695] Map a usertrap vma at 63000 D0712 20:23:43.931509 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 1 D0712 20:23:43.931549 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:43.931754 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.931774 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 2 D0712 20:23:43.931790 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:43.932397 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.932421 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 3 D0712 20:23:43.932435 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:43.938128 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.938155 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 4 D0712 20:23:43.938167 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:43.939120 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.939136 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 5 D0712 20:23:43.939147 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:43.939177 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.939182 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 6 D0712 20:23:43.939187 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:43.939329 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.939360 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 7 D0712 20:23:43.939369 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:43.939584 30210 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.939609 30210 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc001972660 8 D0712 20:23:43.939621 30210 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:43.939850 30210 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.939919 30210 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc001972660 9 D0712 20:23:43.939961 30210 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:43.939981 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.939988 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 10 D0712 20:23:43.940006 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:43.947022 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.947048 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 11 D0712 20:23:43.947058 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:43.950503 30210 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.950534 30210 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc001972660 12 D0712 20:23:43.950548 30210 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:43.950601 30210 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.950627 30210 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc001972660 13 D0712 20:23:43.950640 30210 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:43.950659 30210 task_signals.go:470] [ 695: 695] Notified of signal 23 D0712 20:23:43.950724 30210 task_signals.go:220] [ 695: 695] Signal 23: delivering to handler D0712 20:23:43.955579 30210 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.955604 30210 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc001972660 14 D0712 20:23:43.955616 30210 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:43.955661 30210 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.955690 30210 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.955713 30210 task_signals.go:204] [ 695: 696] Signal 695, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.955713 30210 task_signals.go:204] [ 695: 697] Signal 695, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.955727 30210 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.955732 30210 task_signals.go:204] [ 695: 698] Signal 695, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.955748 30210 task_signals.go:204] [ 695: 699] Signal 695, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.955756 30210 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.955764 30210 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.955768 30210 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.955776 30210 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.955791 30210 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.955794 30210 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.955801 30210 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.955805 30210 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.955812 30210 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.956798 30210 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.956819 30210 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.956845 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.956865 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:43.956870 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.957029 30210 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.957610 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.958811 30210 syscalls.go:262] [ 700: 700] Allocating stack with size of 8388608 bytes D0712 20:23:43.958993 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.959950 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.959990 30210 usertrap_amd64.go:106] [ 700: 700] Map a usertrap vma at 65000 D0712 20:23:43.960091 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 1 D0712 20:23:43.960116 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:43.960410 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.960422 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 2 D0712 20:23:43.960431 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:43.960982 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.961006 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 3 D0712 20:23:43.961017 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:43.966235 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.966267 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 4 D0712 20:23:43.966278 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:43.967299 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.967321 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 5 D0712 20:23:43.967330 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:43.967377 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.967395 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 6 D0712 20:23:43.967400 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:43.967548 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.967563 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 7 D0712 20:23:43.967568 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:43.967691 30210 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.967718 30210 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0003fe8a0 8 D0712 20:23:43.967729 30210 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:43.967885 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.967902 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 9 D0712 20:23:43.967913 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:43.967924 30210 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.967930 30210 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0003fe8a0 10 D0712 20:23:43.967994 30210 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:43.968147 30210 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.968163 30210 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0003fe8a0 11 D0712 20:23:43.968173 30210 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:43.968266 30210 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.968285 30210 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0003fe8a0 12 D0712 20:23:43.968297 30210 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:43.968402 30210 task_signals.go:470] [ 700: 703] Notified of signal 23 D0712 20:23:43.968426 30210 task_signals.go:179] [ 700: 703] Restarting syscall 202: interrupted by signal 23 D0712 20:23:43.968432 30210 task_signals.go:220] [ 700: 703] Signal 23: delivering to handler D0712 20:23:43.974689 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.974720 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 13 D0712 20:23:43.974732 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:43.978590 30210 task_signals.go:470] [ 700: 700] Notified of signal 23 D0712 20:23:43.978653 30210 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler D0712 20:23:43.978746 30210 task_signals.go:470] [ 700: 700] Notified of signal 23 D0712 20:23:43.978792 30210 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler I0712 20:23:43.984149 30210 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0712 20:23:43.984222 30210 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.984232 30210 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0003fe8a0 14 D0712 20:23:43.984241 30210 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:43.984257 30210 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.984313 30210 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.984315 30210 task_signals.go:204] [ 700: 703] Signal 700, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.984331 30210 task_signals.go:204] [ 700: 704] Signal 700, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.984336 30210 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.984349 30210 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.984356 30210 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.984367 30210 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.984383 30210 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.984386 30210 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.984396 30210 task_signals.go:204] [ 700: 701] Signal 700, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.984403 30210 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.984408 30210 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.984411 30210 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.984419 30210 task_signals.go:204] [ 700: 702] Signal 700, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.984431 30210 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.985520 30210 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.985561 30210 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.985579 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.985615 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:43.985633 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.985714 30210 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.986207 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.987460 30210 syscalls.go:262] [ 705: 705] Allocating stack with size of 8388608 bytes D0712 20:23:43.987569 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.988347 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.988386 30210 usertrap_amd64.go:106] [ 705: 705] Map a usertrap vma at 68000 D0712 20:23:43.988565 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 1 D0712 20:23:43.988597 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:43.989141 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.989170 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 2 D0712 20:23:43.989180 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:43.989714 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.989730 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 3 D0712 20:23:43.989740 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:43.996326 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.996361 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 4 D0712 20:23:43.996372 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:43.997455 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.997489 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 5 D0712 20:23:43.997500 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:43.997532 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.997537 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 6 D0712 20:23:43.997543 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:43.997729 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.997751 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 7 D0712 20:23:43.997757 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:43.997891 30210 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.997913 30210 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc001b993b0 8 D0712 20:23:43.997920 30210 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:43.998065 30210 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.998085 30210 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc001b993b0 9 D0712 20:23:43.998092 30210 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:43.998152 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.998169 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 10 D0712 20:23:43.998176 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:43.998422 30210 usertrap_amd64.go:212] [ 705: 708] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.998453 30210 usertrap_amd64.go:122] [ 705: 708] Allocate a new trap: 0xc001b993b0 11 D0712 20:23:43.998473 30210 usertrap_amd64.go:225] [ 705: 708] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:44.004850 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.004871 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 12 D0712 20:23:44.004884 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:44.008751 30210 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.008784 30210 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc001b993b0 13 D0712 20:23:44.008795 30210 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:44.008841 30210 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.008850 30210 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc001b993b0 14 D0712 20:23:44.008861 30210 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:44.008877 30210 task_signals.go:470] [ 705: 705] Notified of signal 23 D0712 20:23:44.008982 30210 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0712 20:23:44.015040 30210 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.015079 30210 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc001b993b0 15 D0712 20:23:44.015092 30210 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:44.015153 30210 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.015196 30210 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.015196 30210 task_signals.go:204] [ 705: 706] Signal 705, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.015217 30210 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.015246 30210 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.015260 30210 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.015274 30210 task_signals.go:204] [ 705: 708] Signal 705, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.015301 30210 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.015306 30210 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.015309 30210 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.015317 30210 task_signals.go:204] [ 705: 709] Signal 705, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.015324 30210 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.015330 30210 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.015333 30210 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.015340 30210 task_signals.go:204] [ 705: 707] Signal 705, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.015353 30210 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.016528 30210 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.016559 30210 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.016574 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.016640 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.016652 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.016787 30210 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.017515 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.018829 30210 syscalls.go:262] [ 710: 710] Allocating stack with size of 8388608 bytes D0712 20:23:44.018936 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.020348 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.020396 30210 usertrap_amd64.go:106] [ 710: 710] Map a usertrap vma at 60000 D0712 20:23:44.020498 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 1 D0712 20:23:44.020532 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:44.020827 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.020884 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 2 D0712 20:23:44.020902 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:44.022013 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.022051 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 3 D0712 20:23:44.022066 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:44.028170 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.028199 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 4 D0712 20:23:44.028209 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:44.029514 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.029549 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 5 D0712 20:23:44.029567 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:44.031553 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.031580 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 6 D0712 20:23:44.031593 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:44.031843 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.031863 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 7 D0712 20:23:44.031870 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:44.031996 30210 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.032081 30210 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000a072f0 8 D0712 20:23:44.032093 30210 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:44.032192 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.032278 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 9 D0712 20:23:44.032352 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:44.032377 30210 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.032385 30210 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000a072f0 10 D0712 20:23:44.032392 30210 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:44.039733 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.039800 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 11 D0712 20:23:44.039810 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:44.042506 30210 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.042620 30210 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000a072f0 12 D0712 20:23:44.042648 30210 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:44.042704 30210 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.042713 30210 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000a072f0 13 D0712 20:23:44.042721 30210 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:44.042741 30210 task_signals.go:470] [ 710: 710] Notified of signal 23 D0712 20:23:44.042815 30210 task_signals.go:220] [ 710: 710] Signal 23: delivering to handler D0712 20:23:44.049841 30210 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.049875 30210 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000a072f0 14 D0712 20:23:44.049888 30210 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:44.049916 30210 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.049941 30210 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.049976 30210 task_signals.go:204] [ 710: 712] Signal 710, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.049991 30210 task_signals.go:204] [ 710: 713] Signal 710, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.049976 30210 task_signals.go:204] [ 710: 714] Signal 710, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.050017 30210 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.049998 30210 task_signals.go:204] [ 710: 711] Signal 710, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.050034 30210 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.050046 30210 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.050066 30210 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.050100 30210 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.050107 30210 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.050116 30210 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.050123 30210 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.050131 30210 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.050138 30210 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.051143 30210 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.051168 30210 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.051179 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.051205 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.051216 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.051321 30210 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.051970 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.053297 30210 syscalls.go:262] [ 715: 715] Allocating stack with size of 8388608 bytes D0712 20:23:44.053399 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.054219 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.054254 30210 usertrap_amd64.go:106] [ 715: 715] Map a usertrap vma at 61000 D0712 20:23:44.054339 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 1 D0712 20:23:44.054366 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.054654 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.054699 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 2 D0712 20:23:44.054709 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.055271 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.055302 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 3 D0712 20:23:44.055314 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.060617 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.060645 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 4 D0712 20:23:44.060658 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.061740 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.061762 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 5 D0712 20:23:44.061769 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.061852 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.061870 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 6 D0712 20:23:44.061880 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.062103 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.062127 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 7 D0712 20:23:44.062135 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.062303 30210 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.062318 30210 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0019731d0 8 D0712 20:23:44.062325 30210 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.062514 30210 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.062534 30210 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0019731d0 9 D0712 20:23:44.062542 30210 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.062683 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.062703 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 10 D0712 20:23:44.062711 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.063122 30210 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.063149 30210 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0019731d0 11 D0712 20:23:44.063161 30210 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.063204 30210 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.063223 30210 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0019731d0 12 D0712 20:23:44.063233 30210 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.063248 30210 task_signals.go:470] [ 715: 715] Notified of signal 23 D0712 20:23:44.063289 30210 task_signals.go:220] [ 715: 715] Signal 23: delivering to handler D0712 20:23:44.069360 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.069391 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 13 D0712 20:23:44.069403 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.073418 30210 task_signals.go:470] [ 715: 715] Notified of signal 23 D0712 20:23:44.073461 30210 task_signals.go:220] [ 715: 715] Signal 23: delivering to handler D0712 20:23:44.080037 30210 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.080068 30210 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0019731d0 14 D0712 20:23:44.080079 30210 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.080163 30210 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.080207 30210 task_signals.go:204] [ 715: 718] Signal 715, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.080237 30210 task_signals.go:204] [ 715: 717] Signal 715, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.080248 30210 task_signals.go:204] [ 715: 719] Signal 715, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.080269 30210 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.080292 30210 task_signals.go:204] [ 715: 716] Signal 715, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.080314 30210 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.080423 30210 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.080439 30210 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.080492 30210 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.080522 30210 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.080527 30210 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.080539 30210 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.080546 30210 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.080549 30210 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.080560 30210 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.081894 30210 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.081971 30210 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.082011 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.082085 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.082309 30210 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.083075 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.084795 30210 syscalls.go:262] [ 720: 720] Allocating stack with size of 8388608 bytes D0712 20:23:44.085033 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.086389 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.086529 30210 usertrap_amd64.go:106] [ 720: 720] Map a usertrap vma at 65000 D0712 20:23:44.086684 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 1 D0712 20:23:44.086730 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:44.087070 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.087100 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 2 D0712 20:23:44.087111 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:44.087663 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.087688 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 3 D0712 20:23:44.087696 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:44.093671 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.093701 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 4 D0712 20:23:44.093710 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:44.094968 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.094995 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 5 D0712 20:23:44.095006 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:44.095106 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.095145 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 6 D0712 20:23:44.095162 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:44.095449 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.095467 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 7 D0712 20:23:44.095479 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:44.095610 30210 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.095629 30210 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001b99800 8 D0712 20:23:44.095638 30210 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:44.095828 30210 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.095849 30210 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001b99800 9 D0712 20:23:44.095857 30210 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:44.095876 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.095883 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 10 D0712 20:23:44.095890 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:44.103449 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.103498 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 11 D0712 20:23:44.103514 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:44.106774 30210 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.106835 30210 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001b99800 12 D0712 20:23:44.106852 30210 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:44.106919 30210 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.106941 30210 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001b99800 13 D0712 20:23:44.106950 30210 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:44.107011 30210 task_signals.go:470] [ 720: 720] Notified of signal 23 D0712 20:23:44.107078 30210 task_signals.go:220] [ 720: 720] Signal 23: delivering to handler D0712 20:23:44.115821 30210 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.115852 30210 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001b99800 14 D0712 20:23:44.115867 30210 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:44.115917 30210 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.115947 30210 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.115975 30210 task_signals.go:204] [ 720: 721] Signal 720, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.116016 30210 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.116025 30210 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.116031 30210 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.116093 30210 task_signals.go:204] [ 720: 722] Signal 720, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.116201 30210 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.116241 30210 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.116249 30210 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.116269 30210 task_signals.go:204] [ 720: 723] Signal 720, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.116282 30210 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.116289 30210 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.116312 30210 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.116326 30210 task_signals.go:204] [ 720: 724] Signal 720, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.116337 30210 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.117605 30210 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.117629 30210 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.117644 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.117730 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.117743 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.117849 30210 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.118719 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.120061 30210 syscalls.go:262] [ 725: 725] Allocating stack with size of 8388608 bytes D0712 20:23:44.120142 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.121656 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.121692 30210 usertrap_amd64.go:106] [ 725: 725] Map a usertrap vma at 69000 D0712 20:23:44.121772 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 1 D0712 20:23:44.121802 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.122140 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.122164 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 2 D0712 20:23:44.122173 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.123345 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.123418 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 3 D0712 20:23:44.123439 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.130789 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.130827 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 4 D0712 20:23:44.130843 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.131906 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.131945 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 5 D0712 20:23:44.131969 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.132027 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.132036 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 6 D0712 20:23:44.132043 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.132345 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.132436 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 7 D0712 20:23:44.132453 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.132695 30210 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.132724 30210 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000a07620 8 D0712 20:23:44.132733 30210 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.133023 30210 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.133057 30210 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000a07620 9 D0712 20:23:44.133069 30210 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.133115 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.133139 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 10 D0712 20:23:44.133154 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.141464 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.141499 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 11 D0712 20:23:44.141511 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.143891 30210 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.143921 30210 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000a07620 12 D0712 20:23:44.143932 30210 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.143971 30210 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.143979 30210 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000a07620 13 D0712 20:23:44.143986 30210 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.144003 30210 task_signals.go:470] [ 725: 725] Notified of signal 23 D0712 20:23:44.144130 30210 task_signals.go:220] [ 725: 725] Signal 23: delivering to handler D0712 20:23:44.151807 30210 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.151871 30210 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000a07620 14 D0712 20:23:44.151896 30210 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.151975 30210 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.152018 30210 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.152020 30210 task_signals.go:204] [ 725: 728] Signal 725, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.152038 30210 task_signals.go:204] [ 725: 729] Signal 725, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.152049 30210 task_signals.go:204] [ 725: 727] Signal 725, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.152053 30210 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.152070 30210 task_signals.go:204] [ 725: 726] Signal 725, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.152111 30210 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.152120 30210 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.152139 30210 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.152149 30210 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.152155 30210 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.152168 30210 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.152193 30210 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.152209 30210 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.152229 30210 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.153463 30210 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.153508 30210 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.153533 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.153573 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.153629 30210 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.154348 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.155757 30210 syscalls.go:262] [ 730: 730] Allocating stack with size of 8388608 bytes D0712 20:23:44.155873 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.156843 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.156907 30210 usertrap_amd64.go:106] [ 730: 730] Map a usertrap vma at 6a000 D0712 20:23:44.157014 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 1 D0712 20:23:44.157056 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:44.159395 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.159426 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 2 D0712 20:23:44.159438 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:44.161723 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.161754 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 3 D0712 20:23:44.161769 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:44.167949 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.168006 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 4 D0712 20:23:44.168024 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:44.169210 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.169242 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 5 D0712 20:23:44.169258 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:44.169533 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.169558 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 6 D0712 20:23:44.169570 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:44.169947 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.169964 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 7 D0712 20:23:44.169974 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:44.170161 30210 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.170186 30210 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0008aa480 8 D0712 20:23:44.170201 30210 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:44.170477 30210 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.170530 30210 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0008aa480 9 D0712 20:23:44.170544 30210 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:44.170561 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.170579 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 10 D0712 20:23:44.170587 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:44.177589 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.177638 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 11 D0712 20:23:44.177649 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:44.181541 30210 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.181576 30210 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0008aa480 12 D0712 20:23:44.181590 30210 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:44.181668 30210 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.181699 30210 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0008aa480 13 D0712 20:23:44.181716 30210 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:44.181763 30210 task_signals.go:470] [ 730: 730] Notified of signal 23 D0712 20:23:44.181808 30210 task_signals.go:220] [ 730: 730] Signal 23: delivering to handler I0712 20:23:44.187766 30210 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0712 20:23:44.187860 30210 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.187894 30210 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0008aa480 14 D0712 20:23:44.187908 30210 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:44.188119 30210 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.188167 30210 task_signals.go:204] [ 730: 731] Signal 730, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.188182 30210 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.188200 30210 task_signals.go:204] [ 730: 734] Signal 730, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.188217 30210 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.188207 30210 task_signals.go:204] [ 730: 735] Signal 730, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.188216 30210 task_signals.go:204] [ 730: 732] Signal 730, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.188248 30210 task_signals.go:204] [ 730: 733] Signal 730, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.188260 30210 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.188266 30210 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.188280 30210 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.188299 30210 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.188305 30210 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.188315 30210 task_exit.go:204] [ 730: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.188322 30210 task_exit.go:204] [ 730: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.188328 30210 task_exit.go:204] [ 730: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.188340 30210 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.188348 30210 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.188355 30210 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.188364 30210 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.189614 30210 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.189646 30210 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.189666 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.189700 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.189715 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.189852 30210 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.190517 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.192136 30210 syscalls.go:262] [ 736: 736] Allocating stack with size of 8388608 bytes D0712 20:23:44.192252 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.193699 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.193739 30210 usertrap_amd64.go:106] [ 736: 736] Map a usertrap vma at 6a000 D0712 20:23:44.193827 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 1 D0712 20:23:44.193856 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:44.194264 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.194299 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 2 D0712 20:23:44.194314 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:44.194937 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.194992 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 3 D0712 20:23:44.195006 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:44.200995 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.201040 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 4 D0712 20:23:44.201054 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:44.202326 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.202359 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 5 D0712 20:23:44.202374 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:44.205083 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.205123 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 6 D0712 20:23:44.205139 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:44.205587 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.205614 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 7 D0712 20:23:44.205626 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:44.205841 30210 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.205869 30210 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc001973980 8 D0712 20:23:44.205881 30210 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:44.206079 30210 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.206096 30210 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc001973980 9 D0712 20:23:44.206106 30210 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:44.206285 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.206319 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 10 D0712 20:23:44.206335 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:44.214394 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.214439 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 11 D0712 20:23:44.214462 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:44.217200 30210 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.217238 30210 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc001973980 12 D0712 20:23:44.217254 30210 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:44.218866 30210 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.218954 30210 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc001973980 13 D0712 20:23:44.218984 30210 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:44.219036 30210 task_signals.go:470] [ 736: 736] Notified of signal 23 D0712 20:23:44.219090 30210 task_signals.go:220] [ 736: 736] Signal 23: delivering to handler D0712 20:23:44.225268 30210 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.225300 30210 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc001973980 14 D0712 20:23:44.225315 30210 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:44.225366 30210 task_exit.go:204] [ 736: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.225391 30210 task_exit.go:204] [ 736: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.225423 30210 task_signals.go:204] [ 736: 737] Signal 736, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.225440 30210 task_signals.go:204] [ 736: 739] Signal 736, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.225482 30210 task_signals.go:204] [ 736: 740] Signal 736, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.225501 30210 task_exit.go:204] [ 736: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.225524 30210 task_signals.go:204] [ 736: 738] Signal 736, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.225544 30210 task_exit.go:204] [ 736: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.225570 30210 task_exit.go:204] [ 736: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.225589 30210 task_exit.go:204] [ 736: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.225599 30210 task_exit.go:204] [ 736: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.225605 30210 task_exit.go:204] [ 736: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.225635 30210 task_exit.go:204] [ 736: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.225688 30210 task_exit.go:204] [ 736: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.225705 30210 task_exit.go:204] [ 736: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.225720 30210 task_exit.go:204] [ 736: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.226981 30210 task_exit.go:204] [ 736: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.227070 30210 task_exit.go:204] [ 736: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.227133 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.227222 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.227234 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.227508 30210 task_exit.go:204] [ 736: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.228017 30210 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0712 20:23:44.228102 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.229429 30210 syscalls.go:262] [ 741: 741] Allocating stack with size of 8388608 bytes D0712 20:23:44.229534 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.229656 30210 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0712 20:23:44.230910 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.230972 30210 usertrap_amd64.go:106] [ 741: 741] Map a usertrap vma at 69000 D0712 20:23:44.231084 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 1 D0712 20:23:44.231122 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.231426 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.231448 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 2 D0712 20:23:44.231466 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.232033 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.232061 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 3 D0712 20:23:44.232074 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.238680 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.238705 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 4 D0712 20:23:44.238714 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.239837 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.239865 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 5 D0712 20:23:44.239873 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.239922 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.239930 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 6 D0712 20:23:44.239938 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.240267 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.240293 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 7 D0712 20:23:44.240303 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.240433 30210 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.240450 30210 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc001b99e60 8 D0712 20:23:44.240456 30210 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.240586 30210 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.240603 30210 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc001b99e60 9 D0712 20:23:44.240609 30210 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.240648 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.240677 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 10 D0712 20:23:44.240693 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.241133 30210 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.241164 30210 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc001b99e60 11 D0712 20:23:44.241173 30210 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.241267 30210 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.241281 30210 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc001b99e60 12 D0712 20:23:44.241287 30210 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.241327 30210 task_signals.go:470] [ 741: 741] Notified of signal 23 D0712 20:23:44.241357 30210 task_signals.go:220] [ 741: 741] Signal 23: delivering to handler D0712 20:23:44.249151 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.249280 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 13 D0712 20:23:44.249354 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.253393 30210 task_signals.go:470] [ 741: 741] Notified of signal 23 D0712 20:23:44.253544 30210 task_signals.go:220] [ 741: 741] Signal 23: delivering to handler I0712 20:23:44.263740 30210 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0712 20:23:44.264757 30210 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.264784 30210 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc001b99e60 14 D0712 20:23:44.264820 30210 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.265174 30210 task_signals.go:470] [ 741: 741] Notified of signal 23 D0712 20:23:44.265303 30210 task_exit.go:204] [ 741: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.265342 30210 task_exit.go:204] [ 741: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.265368 30210 task_signals.go:204] [ 741: 743] Signal 741, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.265374 30210 task_signals.go:204] [ 741: 745] Signal 741, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.265396 30210 task_exit.go:204] [ 741: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.265408 30210 task_signals.go:204] [ 741: 744] Signal 741, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.265431 30210 task_exit.go:204] [ 741: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.265437 30210 task_exit.go:204] [ 741: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.265456 30210 task_exit.go:204] [ 741: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.265473 30210 task_exit.go:204] [ 741: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.265480 30210 task_exit.go:204] [ 741: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.265491 30210 task_exit.go:204] [ 741: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.265499 30210 task_exit.go:204] [ 741: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.265664 30210 task_exit.go:204] [ 741: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.265710 30210 task_signals.go:204] [ 741: 742] Signal 741, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.265724 30210 task_exit.go:204] [ 741: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.267012 30210 task_exit.go:204] [ 741: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.267043 30210 task_exit.go:204] [ 741: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.267059 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.267238 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.267281 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.267650 30210 task_exit.go:204] [ 741: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.267769 30210 task_signals.go:470] [ 7: 7] Notified of signal 23 D0712 20:23:44.267811 30210 task_signals.go:176] [ 7: 7] Not restarting syscall 35 after errno &{516 %!d(string=interrupted by signal)}: interrupted by signal 23 D0712 20:23:44.267876 30210 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0712 20:23:44.268500 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.270017 30210 syscalls.go:262] [ 746: 746] Allocating stack with size of 8388608 bytes D0712 20:23:44.270124 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.272401 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.272454 30210 usertrap_amd64.go:106] [ 746: 746] Map a usertrap vma at 67000 D0712 20:23:44.272548 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 1 D0712 20:23:44.272602 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:44.273116 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.273137 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 2 D0712 20:23:44.273151 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:44.273589 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.273627 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 3 D0712 20:23:44.273641 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:44.285787 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.285820 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 4 D0712 20:23:44.285832 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:44.287075 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.287100 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 5 D0712 20:23:44.287114 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:44.287240 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.287265 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 6 D0712 20:23:44.287276 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:44.287645 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.287669 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 7 D0712 20:23:44.287677 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:44.287896 30210 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.287923 30210 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc001973ce0 8 D0712 20:23:44.287936 30210 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:44.288081 30210 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.288103 30210 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc001973ce0 9 D0712 20:23:44.288114 30210 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:44.288288 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.288341 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 10 D0712 20:23:44.288355 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:44.295093 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.295127 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 11 D0712 20:23:44.295145 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:44.298827 30210 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.298843 30210 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc001973ce0 12 D0712 20:23:44.298875 30210 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:44.298932 30210 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.298945 30210 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc001973ce0 13 D0712 20:23:44.298954 30210 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:44.299026 30210 task_signals.go:470] [ 746: 746] Notified of signal 23 D0712 20:23:44.299118 30210 task_signals.go:220] [ 746: 746] Signal 23: delivering to handler D0712 20:23:44.305112 30210 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.305189 30210 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc001973ce0 14 D0712 20:23:44.305209 30210 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:44.305293 30210 task_exit.go:204] [ 746: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.305321 30210 task_exit.go:204] [ 746: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.305337 30210 task_signals.go:204] [ 746: 748] Signal 746, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.305360 30210 task_signals.go:204] [ 746: 749] Signal 746, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.305363 30210 task_signals.go:204] [ 746: 747] Signal 746, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.305378 30210 task_exit.go:204] [ 746: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.305402 30210 task_signals.go:204] [ 746: 750] Signal 746, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.305415 30210 task_exit.go:204] [ 746: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.305491 30210 task_exit.go:204] [ 746: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.305502 30210 task_exit.go:204] [ 746: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.305631 30210 task_exit.go:204] [ 746: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.305650 30210 task_exit.go:204] [ 746: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.305656 30210 task_exit.go:204] [ 746: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.305666 30210 task_exit.go:204] [ 746: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.305789 30210 task_exit.go:204] [ 746: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.305806 30210 task_exit.go:204] [ 746: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.306804 30210 task_exit.go:204] [ 746: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.306819 30210 task_exit.go:204] [ 746: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.306831 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.306859 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.306867 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.306954 30210 task_exit.go:204] [ 746: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.307864 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.309746 30210 syscalls.go:262] [ 751: 751] Allocating stack with size of 8388608 bytes D0712 20:23:44.309865 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.311238 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.311272 30210 usertrap_amd64.go:106] [ 751: 751] Map a usertrap vma at 69000 D0712 20:23:44.311356 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 1 D0712 20:23:44.311393 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.311913 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.311928 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 2 D0712 20:23:44.311938 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.312504 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.312525 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 3 D0712 20:23:44.312537 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.318464 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.318494 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 4 D0712 20:23:44.318505 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.319560 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.319578 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 5 D0712 20:23:44.319589 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.319639 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.319646 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 6 D0712 20:23:44.319654 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.319816 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.319829 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 7 D0712 20:23:44.319835 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.319984 30210 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.320002 30210 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc000a07fb0 8 D0712 20:23:44.320009 30210 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.320300 30210 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.320319 30210 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc000a07fb0 9 D0712 20:23:44.320327 30210 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.320368 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.320381 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 10 D0712 20:23:44.320390 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.320855 30210 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.320882 30210 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc000a07fb0 11 D0712 20:23:44.320894 30210 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.320998 30210 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.321013 30210 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc000a07fb0 12 D0712 20:23:44.321024 30210 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.321059 30210 task_signals.go:470] [ 751: 751] Notified of signal 23 D0712 20:23:44.321085 30210 task_signals.go:220] [ 751: 751] Signal 23: delivering to handler D0712 20:23:44.329245 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.329280 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 13 D0712 20:23:44.329290 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.332061 30210 task_signals.go:470] [ 751: 751] Notified of signal 23 D0712 20:23:44.332153 30210 task_signals.go:220] [ 751: 751] Signal 23: delivering to handler I0712 20:23:44.344480 30210 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0712 20:23:44.344541 30210 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.344554 30210 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc000a07fb0 14 D0712 20:23:44.344567 30210 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.344618 30210 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.344640 30210 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.344639 30210 task_signals.go:204] [ 751: 753] Signal 751, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.344661 30210 task_signals.go:204] [ 751: 755] Signal 751, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.344656 30210 task_signals.go:204] [ 751: 754] Signal 751, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.344672 30210 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.344702 30210 task_signals.go:204] [ 751: 752] Signal 751, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.344728 30210 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.344743 30210 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.344754 30210 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.344803 30210 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.344817 30210 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.344860 30210 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.344870 30210 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.344875 30210 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.344885 30210 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.346351 30210 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.346379 30210 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.346392 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.346450 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.346466 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.346560 30210 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.347359 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.348836 30210 syscalls.go:262] [ 756: 756] Allocating stack with size of 8388608 bytes D0712 20:23:44.349005 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.349942 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.349977 30210 usertrap_amd64.go:106] [ 756: 756] Map a usertrap vma at 64000 D0712 20:23:44.350064 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 1 D0712 20:23:44.350083 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:44.350262 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.350278 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 2 D0712 20:23:44.350284 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:44.350564 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.350608 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 3 D0712 20:23:44.350632 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:44.357082 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.357103 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 4 D0712 20:23:44.357115 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:44.358160 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.358187 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 5 D0712 20:23:44.358199 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:44.358270 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.358285 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 6 D0712 20:23:44.358294 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:44.358649 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.358657 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 7 D0712 20:23:44.358663 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:44.358766 30210 usertrap_amd64.go:212] [ 756: 757] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.358781 30210 usertrap_amd64.go:122] [ 756: 757] Allocate a new trap: 0xc0003d2780 8 D0712 20:23:44.358798 30210 usertrap_amd64.go:225] [ 756: 757] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:44.358866 30210 usertrap_amd64.go:212] [ 756: 757] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.358875 30210 usertrap_amd64.go:122] [ 756: 757] Allocate a new trap: 0xc0003d2780 9 D0712 20:23:44.358884 30210 usertrap_amd64.go:225] [ 756: 757] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:44.358986 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.358997 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 10 D0712 20:23:44.359004 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:44.367670 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.367700 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 11 D0712 20:23:44.367710 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:44.370031 30210 usertrap_amd64.go:212] [ 756: 757] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.370063 30210 usertrap_amd64.go:122] [ 756: 757] Allocate a new trap: 0xc0003d2780 12 D0712 20:23:44.370077 30210 usertrap_amd64.go:225] [ 756: 757] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:44.370143 30210 usertrap_amd64.go:212] [ 756: 757] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.370153 30210 usertrap_amd64.go:122] [ 756: 757] Allocate a new trap: 0xc0003d2780 13 D0712 20:23:44.370162 30210 usertrap_amd64.go:225] [ 756: 757] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:44.370216 30210 task_signals.go:470] [ 756: 756] Notified of signal 23 D0712 20:23:44.370280 30210 task_signals.go:220] [ 756: 756] Signal 23: delivering to handler D0712 20:23:44.377346 30210 sampler.go:191] Time: Adjusting syscall overhead down to 875 I0712 20:23:44.377662 30210 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0712 20:23:44.377757 30210 usertrap_amd64.go:212] [ 756: 756] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.377777 30210 usertrap_amd64.go:122] [ 756: 756] Allocate a new trap: 0xc0003d2780 14 D0712 20:23:44.377786 30210 usertrap_amd64.go:225] [ 756: 756] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:44.377806 30210 task_exit.go:204] [ 756: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.377837 30210 task_exit.go:204] [ 756: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.377877 30210 task_signals.go:204] [ 756: 759] Signal 756, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.377897 30210 task_exit.go:204] [ 756: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.377905 30210 task_exit.go:204] [ 756: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.377913 30210 task_exit.go:204] [ 756: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.377870 30210 task_signals.go:204] [ 756: 757] Signal 756, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.377950 30210 task_signals.go:204] [ 756: 760] Signal 756, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.377958 30210 task_exit.go:204] [ 756: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.377971 30210 task_signals.go:204] [ 756: 758] Signal 756, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.377979 30210 task_exit.go:204] [ 756: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.377983 30210 task_exit.go:204] [ 756: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.377989 30210 task_exit.go:204] [ 756: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.378016 30210 task_exit.go:204] [ 756: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.378033 30210 task_exit.go:204] [ 756: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.378047 30210 task_exit.go:204] [ 756: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.379256 30210 task_exit.go:204] [ 756: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.379293 30210 task_exit.go:204] [ 756: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.379310 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.379348 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.379357 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.379535 30210 task_exit.go:204] [ 756: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.380126 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.381755 30210 syscalls.go:262] [ 761: 761] Allocating stack with size of 8388608 bytes D0712 20:23:44.381956 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.383422 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.383478 30210 usertrap_amd64.go:106] [ 761: 761] Map a usertrap vma at 65000 D0712 20:23:44.383568 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 1 D0712 20:23:44.383610 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:44.383913 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.383936 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 2 D0712 20:23:44.383947 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:44.385048 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.385074 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 3 D0712 20:23:44.385086 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:44.390810 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.390847 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 4 D0712 20:23:44.390859 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:44.392010 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.392045 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 5 D0712 20:23:44.392056 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:44.392099 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.392108 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 6 D0712 20:23:44.392115 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:44.392332 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.392416 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 7 D0712 20:23:44.392442 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:44.392622 30210 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.392679 30210 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0003ff650 8 D0712 20:23:44.392696 30210 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:44.392794 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.392821 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 9 D0712 20:23:44.392853 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:44.392866 30210 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.392873 30210 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0003ff650 10 D0712 20:23:44.392880 30210 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:44.393484 30210 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.393518 30210 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0003ff650 11 D0712 20:23:44.393531 30210 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:44.393611 30210 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.393629 30210 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0003ff650 12 D0712 20:23:44.393637 30210 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:44.393657 30210 task_signals.go:470] [ 761: 761] Notified of signal 23 D0712 20:23:44.393715 30210 task_signals.go:220] [ 761: 761] Signal 23: delivering to handler D0712 20:23:44.400616 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.400643 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 13 D0712 20:23:44.400651 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:44.405752 30210 task_signals.go:470] [ 761: 761] Notified of signal 23 D0712 20:23:44.407169 30210 task_signals.go:220] [ 761: 761] Signal 23: delivering to handler D0712 20:23:44.407324 30210 task_signals.go:470] [ 761: 761] Notified of signal 23 D0712 20:23:44.407384 30210 task_signals.go:220] [ 761: 761] Signal 23: delivering to handler D0712 20:23:44.411219 30210 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.411262 30210 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0003ff650 14 D0712 20:23:44.411277 30210 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:44.411333 30210 task_exit.go:204] [ 761: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.411358 30210 task_exit.go:204] [ 761: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.411396 30210 task_signals.go:204] [ 761: 762] Signal 761, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.411424 30210 task_exit.go:204] [ 761: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.411433 30210 task_exit.go:204] [ 761: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.411439 30210 task_exit.go:204] [ 761: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.411432 30210 task_signals.go:204] [ 761: 764] Signal 761, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.411459 30210 task_signals.go:204] [ 761: 766] Signal 761, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.411474 30210 task_exit.go:204] [ 761: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.411507 30210 task_signals.go:204] [ 761: 765] Signal 761, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.411473 30210 task_signals.go:204] [ 761: 763] Signal 761, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.411524 30210 task_exit.go:204] [ 761: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.411549 30210 task_exit.go:204] [ 761: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.411560 30210 task_exit.go:204] [ 761: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.411565 30210 task_exit.go:204] [ 761: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.411569 30210 task_exit.go:204] [ 761: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.411577 30210 task_exit.go:204] [ 761: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.411582 30210 task_exit.go:204] [ 761: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.411585 30210 task_exit.go:204] [ 761: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.411593 30210 task_exit.go:204] [ 761: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.412875 30210 task_exit.go:204] [ 761: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.412906 30210 task_exit.go:204] [ 761: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.412930 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.413007 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.413016 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.413161 30210 task_exit.go:204] [ 761: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.413740 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.415285 30210 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0712 20:23:44.415558 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.417162 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.417289 30210 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 66000 D0712 20:23:44.417442 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 1 D0712 20:23:44.417492 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:44.417956 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.417981 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 2 D0712 20:23:44.417991 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:44.418591 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.418647 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 3 D0712 20:23:44.418660 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:44.424239 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.424258 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 4 D0712 20:23:44.424271 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:44.425427 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.425462 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 5 D0712 20:23:44.425483 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:44.425541 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.425563 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 6 D0712 20:23:44.425581 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:44.426106 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.426124 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 7 D0712 20:23:44.426136 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:44.426298 30210 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.426319 30210 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0003ffaa0 8 D0712 20:23:44.426328 30210 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:44.426579 30210 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.426610 30210 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0003ffaa0 9 D0712 20:23:44.426628 30210 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:44.426644 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.426651 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 10 D0712 20:23:44.426660 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:44.434059 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.434092 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 11 D0712 20:23:44.434104 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:44.437329 30210 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.437437 30210 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0003ffaa0 12 D0712 20:23:44.437469 30210 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:44.437561 30210 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.437588 30210 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0003ffaa0 13 D0712 20:23:44.437598 30210 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:44.437652 30210 task_signals.go:470] [ 767: 767] Notified of signal 23 D0712 20:23:44.437830 30210 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0712 20:23:44.446040 30210 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.446079 30210 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0003ffaa0 14 D0712 20:23:44.446093 30210 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:44.446149 30210 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.446191 30210 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.446213 30210 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.446230 30210 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.446268 30210 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.446276 30210 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.446233 30210 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.446295 30210 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.446303 30210 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.446312 30210 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.446233 30210 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.446335 30210 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.446211 30210 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.446343 30210 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.446383 30210 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.446423 30210 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.447577 30210 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.447604 30210 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.447616 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.447648 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.447655 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.447807 30210 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.448594 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.450273 30210 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0712 20:23:44.450403 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.452462 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.452518 30210 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 63000 D0712 20:23:44.452632 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 1 D0712 20:23:44.452670 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:44.453249 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.453302 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 2 D0712 20:23:44.453319 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:44.454108 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.454137 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 3 D0712 20:23:44.454149 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:44.460253 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.460278 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 4 D0712 20:23:44.460293 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:44.461636 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.461653 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 5 D0712 20:23:44.461664 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:44.462306 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.462350 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 6 D0712 20:23:44.462360 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:44.462626 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.462650 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 7 D0712 20:23:44.462659 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:44.462858 30210 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.462871 30210 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00129cc30 8 D0712 20:23:44.462891 30210 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:44.463064 30210 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.463176 30210 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00129cc30 9 D0712 20:23:44.463204 30210 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:44.463244 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.463255 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 10 D0712 20:23:44.463263 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:44.470546 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.470579 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 11 D0712 20:23:44.470592 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:44.473461 30210 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.473512 30210 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00129cc30 12 D0712 20:23:44.473527 30210 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:44.473561 30210 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.473586 30210 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00129cc30 13 D0712 20:23:44.473597 30210 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:44.473658 30210 task_signals.go:470] [ 772: 772] Notified of signal 23 D0712 20:23:44.473735 30210 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0712 20:23:44.482857 30210 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.482884 30210 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00129cc30 14 D0712 20:23:44.482900 30210 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:44.482950 30210 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.482969 30210 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.483001 30210 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.483028 30210 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.483003 30210 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.483038 30210 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.483074 30210 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.483023 30210 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.483093 30210 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.483099 30210 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.483107 30210 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.483111 30210 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.483117 30210 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.483121 30210 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.483124 30210 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.483132 30210 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.484440 30210 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.484478 30210 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.484493 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.484530 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.484554 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.484659 30210 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.485424 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.487047 30210 syscalls.go:262] [ 777: 777] Allocating stack with size of 8388608 bytes D0712 20:23:44.487144 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.489085 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.489161 30210 usertrap_amd64.go:106] [ 777: 777] Map a usertrap vma at 63000 D0712 20:23:44.489253 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 1 D0712 20:23:44.489318 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:44.489742 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.489783 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 2 D0712 20:23:44.489799 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:44.490497 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.490533 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 3 D0712 20:23:44.490570 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:44.497338 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.497371 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 4 D0712 20:23:44.497385 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:44.498636 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.498663 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 5 D0712 20:23:44.498676 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:44.498742 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.498770 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 6 D0712 20:23:44.498777 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:44.499254 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.499312 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 7 D0712 20:23:44.499328 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:44.499608 30210 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.499634 30210 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0003d2cc0 8 D0712 20:23:44.499645 30210 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:44.499822 30210 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.499851 30210 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0003d2cc0 9 D0712 20:23:44.499860 30210 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:44.500006 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.500034 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 10 D0712 20:23:44.500047 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:44.508129 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.508159 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 11 D0712 20:23:44.508174 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:44.510766 30210 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.510818 30210 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0003d2cc0 12 D0712 20:23:44.510840 30210 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:44.510917 30210 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.510929 30210 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0003d2cc0 13 D0712 20:23:44.510940 30210 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:44.510987 30210 task_signals.go:470] [ 777: 777] Notified of signal 23 D0712 20:23:44.511045 30210 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0712 20:23:44.519101 30210 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.519143 30210 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0003d2cc0 14 D0712 20:23:44.519160 30210 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:44.519264 30210 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.519304 30210 task_signals.go:204] [ 777: 778] Signal 777, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.519326 30210 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.519348 30210 task_signals.go:204] [ 777: 779] Signal 777, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.519346 30210 task_signals.go:204] [ 777: 781] Signal 777, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.519365 30210 task_signals.go:204] [ 777: 780] Signal 777, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.519379 30210 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.519398 30210 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.519404 30210 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.519420 30210 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.519428 30210 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.519432 30210 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.519438 30210 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.519443 30210 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.519446 30210 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.519454 30210 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.520748 30210 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.520803 30210 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.520822 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.520858 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.520871 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.521069 30210 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.522069 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.523553 30210 syscalls.go:262] [ 782: 782] Allocating stack with size of 8388608 bytes D0712 20:23:44.523637 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.524854 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.524908 30210 usertrap_amd64.go:106] [ 782: 782] Map a usertrap vma at 64000 D0712 20:23:44.525042 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 1 D0712 20:23:44.525072 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:44.525455 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.525470 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 2 D0712 20:23:44.525478 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:44.526058 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.526078 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 3 D0712 20:23:44.526085 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:44.532454 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.532494 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 4 D0712 20:23:44.532512 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:44.533969 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.534030 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 5 D0712 20:23:44.534061 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:44.534125 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.534134 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 6 D0712 20:23:44.534143 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:44.534497 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.534525 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 7 D0712 20:23:44.534534 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:44.534766 30210 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.534782 30210 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008abd40 8 D0712 20:23:44.534788 30210 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:44.534883 30210 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.534897 30210 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008abd40 9 D0712 20:23:44.534903 30210 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:44.535107 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.535138 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 10 D0712 20:23:44.535149 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:44.543954 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.543990 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 11 D0712 20:23:44.544000 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:44.547145 30210 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.547184 30210 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008abd40 12 D0712 20:23:44.547198 30210 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:44.547235 30210 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.547245 30210 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008abd40 13 D0712 20:23:44.547254 30210 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:44.547277 30210 task_signals.go:470] [ 782: 782] Notified of signal 23 D0712 20:23:44.547331 30210 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0712 20:23:44.558798 30210 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.558852 30210 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008abd40 14 D0712 20:23:44.558867 30210 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:44.558940 30210 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.558962 30210 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.558984 30210 task_signals.go:204] [ 782: 785] Signal 782, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.559007 30210 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.559013 30210 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.559008 30210 task_signals.go:204] [ 782: 783] Signal 782, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.559017 30210 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.558984 30210 task_signals.go:204] [ 782: 784] Signal 782, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.559037 30210 task_signals.go:204] [ 782: 786] Signal 782, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.559044 30210 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.559098 30210 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.559152 30210 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.559182 30210 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.559192 30210 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.559198 30210 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.559209 30210 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.560611 30210 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.560656 30210 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.560674 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.560765 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.560783 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.561027 30210 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.561787 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.563235 30210 syscalls.go:262] [ 787: 787] Allocating stack with size of 8388608 bytes D0712 20:23:44.563355 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.564636 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.564689 30210 usertrap_amd64.go:106] [ 787: 787] Map a usertrap vma at 60000 D0712 20:23:44.564793 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 1 D0712 20:23:44.564822 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:44.565336 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.565361 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 2 D0712 20:23:44.565370 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:44.566020 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.566079 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 3 D0712 20:23:44.566110 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:44.571701 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.571731 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 4 D0712 20:23:44.571748 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:44.573088 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.573144 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 5 D0712 20:23:44.573159 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:44.573224 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.573236 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 6 D0712 20:23:44.573242 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:44.573616 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.573662 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 7 D0712 20:23:44.573679 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:44.573857 30210 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.573878 30210 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000a781b0 8 D0712 20:23:44.573895 30210 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:44.574038 30210 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.574067 30210 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000a781b0 9 D0712 20:23:44.574077 30210 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:44.574086 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.574101 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 10 D0712 20:23:44.574112 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:44.582125 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.582159 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 11 D0712 20:23:44.582171 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:44.584557 30210 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.584597 30210 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000a781b0 12 D0712 20:23:44.584615 30210 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:44.584698 30210 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.584728 30210 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000a781b0 13 D0712 20:23:44.584745 30210 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:44.584799 30210 task_signals.go:470] [ 787: 787] Notified of signal 23 D0712 20:23:44.584907 30210 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0712 20:23:44.593279 30210 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.593318 30210 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000a781b0 14 D0712 20:23:44.593334 30210 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:44.593408 30210 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.593456 30210 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.593463 30210 task_signals.go:204] [ 787: 789] Signal 787, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.593492 30210 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.593496 30210 task_signals.go:204] [ 787: 790] Signal 787, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.593506 30210 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.593512 30210 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.593528 30210 task_signals.go:204] [ 787: 791] Signal 787, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.593545 30210 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.593550 30210 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.593542 30210 task_signals.go:204] [ 787: 788] Signal 787, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.593555 30210 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.593562 30210 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.593571 30210 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.593576 30210 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.593603 30210 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.594820 30210 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.594852 30210 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.594865 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.594903 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.594941 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.595020 30210 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.595513 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.597083 30210 syscalls.go:262] [ 792: 792] Allocating stack with size of 8388608 bytes D0712 20:23:44.597167 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.598480 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.598520 30210 usertrap_amd64.go:106] [ 792: 792] Map a usertrap vma at 67000 D0712 20:23:44.598637 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 1 D0712 20:23:44.598669 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:44.599179 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.599208 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 2 D0712 20:23:44.599220 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:44.599913 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.599941 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 3 D0712 20:23:44.599956 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:44.606809 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.606840 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 4 D0712 20:23:44.606853 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:44.608504 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.608557 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 5 D0712 20:23:44.608571 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:44.608623 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.608635 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 6 D0712 20:23:44.608641 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:44.608918 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.608937 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 7 D0712 20:23:44.608971 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:44.609166 30210 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.609196 30210 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc0005e2b70 8 D0712 20:23:44.609208 30210 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:44.609455 30210 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.609484 30210 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc0005e2b70 9 D0712 20:23:44.609496 30210 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:44.609609 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.609641 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 10 D0712 20:23:44.609656 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:44.610136 30210 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.610165 30210 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc0005e2b70 11 D0712 20:23:44.610181 30210 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:44.610217 30210 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.610251 30210 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc0005e2b70 12 D0712 20:23:44.610262 30210 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:44.610311 30210 task_signals.go:470] [ 792: 792] Notified of signal 23 D0712 20:23:44.610390 30210 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0712 20:23:44.617100 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.617124 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 13 D0712 20:23:44.617133 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:44.620998 30210 task_signals.go:470] [ 792: 792] Notified of signal 23 D0712 20:23:44.621073 30210 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0712 20:23:44.627518 30210 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.627597 30210 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc0005e2b70 14 D0712 20:23:44.627623 30210 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:44.627801 30210 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.627857 30210 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.627900 30210 task_signals.go:204] [ 792: 795] Signal 792, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.627919 30210 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.627927 30210 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.627932 30210 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.627953 30210 task_signals.go:204] [ 792: 794] Signal 792, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.627963 30210 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.627971 30210 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.627978 30210 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.628028 30210 task_signals.go:204] [ 792: 796] Signal 792, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.628039 30210 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.628047 30210 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.628054 30210 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.628069 30210 task_signals.go:204] [ 792: 793] Signal 792, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.628078 30210 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.629513 30210 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.629558 30210 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.629574 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.629624 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.629661 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.629832 30210 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.630728 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.632779 30210 syscalls.go:262] [ 797: 797] Allocating stack with size of 8388608 bytes D0712 20:23:44.633043 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.634489 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.634541 30210 usertrap_amd64.go:106] [ 797: 797] Map a usertrap vma at 64000 D0712 20:23:44.634648 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 1 D0712 20:23:44.634696 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:44.635179 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.635199 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 2 D0712 20:23:44.635209 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:44.636071 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.636096 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 3 D0712 20:23:44.636111 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:44.643034 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.643091 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 4 D0712 20:23:44.643106 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:44.644202 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.644230 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 5 D0712 20:23:44.644245 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:44.644360 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.644377 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 6 D0712 20:23:44.644387 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:44.644605 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.644654 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 7 D0712 20:23:44.644680 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:44.645011 30210 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.645036 30210 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc0012320c0 8 D0712 20:23:44.645048 30210 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:44.645319 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.645343 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 9 D0712 20:23:44.645354 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:44.645376 30210 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.645383 30210 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc0012320c0 10 D0712 20:23:44.645410 30210 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:44.657099 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.657160 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 11 D0712 20:23:44.657179 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:44.660990 30210 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.661037 30210 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc0012320c0 12 D0712 20:23:44.661054 30210 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:44.661131 30210 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.661149 30210 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc0012320c0 13 D0712 20:23:44.661161 30210 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:44.661206 30210 task_signals.go:470] [ 797: 797] Notified of signal 23 D0712 20:23:44.661319 30210 task_signals.go:220] [ 797: 797] Signal 23: delivering to handler D0712 20:23:44.673457 30210 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.673482 30210 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc0012320c0 14 D0712 20:23:44.673491 30210 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:44.673556 30210 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.673581 30210 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.673610 30210 task_signals.go:204] [ 797: 801] Signal 797, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.673640 30210 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.673646 30210 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.673650 30210 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.673617 30210 task_signals.go:204] [ 797: 799] Signal 797, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.673673 30210 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.673677 30210 task_signals.go:204] [ 797: 798] Signal 797, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.673710 30210 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.673753 30210 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.673788 30210 task_signals.go:204] [ 797: 800] Signal 797, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.673799 30210 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.673829 30210 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.673843 30210 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.673863 30210 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.675024 30210 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.675055 30210 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.675069 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.675104 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.675125 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.675199 30210 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.675349 30210 task_signals.go:470] [ 7: 20] Notified of signal 23 D0712 20:23:44.675448 30210 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0712 20:23:44.675977 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.677487 30210 syscalls.go:262] [ 802: 802] Allocating stack with size of 8388608 bytes D0712 20:23:44.677605 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.678839 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.678923 30210 usertrap_amd64.go:106] [ 802: 802] Map a usertrap vma at 69000 D0712 20:23:44.679032 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 1 D0712 20:23:44.679072 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.679503 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.679529 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 2 D0712 20:23:44.679539 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.680255 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.680273 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 3 D0712 20:23:44.680279 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.685740 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.685765 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 4 D0712 20:23:44.685774 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.686764 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.686788 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 5 D0712 20:23:44.686801 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.686846 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.686863 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 6 D0712 20:23:44.686888 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.687149 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.687170 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 7 D0712 20:23:44.687179 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.687332 30210 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.687351 30210 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc0003d3800 8 D0712 20:23:44.687362 30210 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.687698 30210 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.687711 30210 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc0003d3800 9 D0712 20:23:44.687720 30210 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.687814 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.687821 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 10 D0712 20:23:44.687826 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.695083 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.695115 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 11 D0712 20:23:44.695130 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.698103 30210 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.698130 30210 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc0003d3800 12 D0712 20:23:44.698141 30210 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.698189 30210 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.698198 30210 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc0003d3800 13 D0712 20:23:44.698207 30210 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.698258 30210 task_signals.go:470] [ 802: 802] Notified of signal 23 D0712 20:23:44.698365 30210 task_signals.go:220] [ 802: 802] Signal 23: delivering to handler D0712 20:23:44.705256 30210 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.705286 30210 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc0003d3800 14 D0712 20:23:44.705302 30210 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.705388 30210 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.705442 30210 task_signals.go:204] [ 802: 803] Signal 802, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.705471 30210 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.705494 30210 task_signals.go:204] [ 802: 805] Signal 802, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.705517 30210 task_signals.go:204] [ 802: 806] Signal 802, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.705529 30210 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.705555 30210 task_signals.go:204] [ 802: 804] Signal 802, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.705578 30210 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.705584 30210 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.705600 30210 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.705609 30210 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.705616 30210 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.705628 30210 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.705638 30210 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.705644 30210 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.705657 30210 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.706739 30210 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.706794 30210 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.706810 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.706839 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.706866 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.706978 30210 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.707775 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.709147 30210 syscalls.go:262] [ 807: 807] Allocating stack with size of 8388608 bytes D0712 20:23:44.709307 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.710602 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.710679 30210 usertrap_amd64.go:106] [ 807: 807] Map a usertrap vma at 60000 D0712 20:23:44.710796 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 1 D0712 20:23:44.710831 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:44.711185 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.711225 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 2 D0712 20:23:44.711237 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:44.711796 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.711819 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 3 D0712 20:23:44.711827 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:44.717636 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.717688 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 4 D0712 20:23:44.717703 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:44.719508 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.719533 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 5 D0712 20:23:44.719547 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:44.719588 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.719596 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 6 D0712 20:23:44.719609 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:44.719778 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.719795 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 7 D0712 20:23:44.719804 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:44.719962 30210 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.719989 30210 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc0003d39e0 8 D0712 20:23:44.720002 30210 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:44.720203 30210 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.720226 30210 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc0003d39e0 9 D0712 20:23:44.720238 30210 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:44.720342 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.720402 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 10 D0712 20:23:44.720424 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:44.728434 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.728484 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 11 D0712 20:23:44.728504 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:44.731187 30210 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.731280 30210 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc0003d39e0 12 D0712 20:23:44.731312 30210 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:44.731361 30210 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.731371 30210 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc0003d39e0 13 D0712 20:23:44.731395 30210 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:44.731444 30210 task_signals.go:470] [ 807: 807] Notified of signal 23 D0712 20:23:44.731516 30210 task_signals.go:220] [ 807: 807] Signal 23: delivering to handler D0712 20:23:44.738751 30210 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.738782 30210 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc0003d39e0 14 D0712 20:23:44.738794 30210 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:44.738851 30210 task_exit.go:204] [ 807: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.738880 30210 task_exit.go:204] [ 807: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.738929 30210 task_signals.go:204] [ 807: 811] Signal 807, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.738957 30210 task_exit.go:204] [ 807: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.738950 30210 task_signals.go:204] [ 807: 809] Signal 807, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.738966 30210 task_exit.go:204] [ 807: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.738943 30210 task_signals.go:204] [ 807: 808] Signal 807, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.738989 30210 task_exit.go:204] [ 807: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.738911 30210 task_signals.go:204] [ 807: 810] Signal 807, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.739058 30210 task_exit.go:204] [ 807: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.739076 30210 task_exit.go:204] [ 807: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.739082 30210 task_exit.go:204] [ 807: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.739109 30210 task_exit.go:204] [ 807: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.739265 30210 task_exit.go:204] [ 807: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.739276 30210 task_exit.go:204] [ 807: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.739318 30210 task_exit.go:204] [ 807: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.740750 30210 task_exit.go:204] [ 807: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.740786 30210 task_exit.go:204] [ 807: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.740812 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.740848 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.740867 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.740981 30210 task_exit.go:204] [ 807: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.741710 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.743192 30210 syscalls.go:262] [ 812: 812] Allocating stack with size of 8388608 bytes D0712 20:23:44.743321 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.746603 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.746637 30210 usertrap_amd64.go:106] [ 812: 812] Map a usertrap vma at 60000 D0712 20:23:44.746746 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 1 D0712 20:23:44.746780 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:44.747175 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.747257 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 2 D0712 20:23:44.747283 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:44.747730 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.747763 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 3 D0712 20:23:44.747779 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:44.754136 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.754164 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 4 D0712 20:23:44.754173 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:44.755304 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.755344 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 5 D0712 20:23:44.755363 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:44.755422 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.755444 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 6 D0712 20:23:44.755454 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:44.755710 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.755737 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 7 D0712 20:23:44.755745 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:44.755928 30210 usertrap_amd64.go:212] [ 812: 813] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.755952 30210 usertrap_amd64.go:122] [ 812: 813] Allocate a new trap: 0xc000a78570 8 D0712 20:23:44.755961 30210 usertrap_amd64.go:225] [ 812: 813] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:44.756152 30210 usertrap_amd64.go:212] [ 812: 813] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.756509 30210 usertrap_amd64.go:122] [ 812: 813] Allocate a new trap: 0xc000a78570 9 D0712 20:23:44.756585 30210 usertrap_amd64.go:225] [ 812: 813] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:44.756635 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.756644 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 10 D0712 20:23:44.756653 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:44.765355 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.765382 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 11 D0712 20:23:44.765391 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:44.767912 30210 usertrap_amd64.go:212] [ 812: 813] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.767959 30210 usertrap_amd64.go:122] [ 812: 813] Allocate a new trap: 0xc000a78570 12 D0712 20:23:44.767976 30210 usertrap_amd64.go:225] [ 812: 813] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:44.768018 30210 usertrap_amd64.go:212] [ 812: 813] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.768027 30210 usertrap_amd64.go:122] [ 812: 813] Allocate a new trap: 0xc000a78570 13 D0712 20:23:44.768036 30210 usertrap_amd64.go:225] [ 812: 813] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:44.768116 30210 task_signals.go:470] [ 812: 812] Notified of signal 23 D0712 20:23:44.768233 30210 task_signals.go:220] [ 812: 812] Signal 23: delivering to handler D0712 20:23:44.778270 30210 usertrap_amd64.go:212] [ 812: 812] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.778304 30210 usertrap_amd64.go:122] [ 812: 812] Allocate a new trap: 0xc000a78570 14 D0712 20:23:44.778315 30210 usertrap_amd64.go:225] [ 812: 812] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:44.778376 30210 task_exit.go:204] [ 812: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.778400 30210 task_exit.go:204] [ 812: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.778429 30210 task_signals.go:204] [ 812: 815] Signal 812, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.778462 30210 task_exit.go:204] [ 812: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.778453 30210 task_signals.go:204] [ 812: 816] Signal 812, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.778468 30210 task_exit.go:204] [ 812: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.778487 30210 task_exit.go:204] [ 812: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.778435 30210 task_signals.go:204] [ 812: 813] Signal 812, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.778516 30210 task_exit.go:204] [ 812: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.778529 30210 task_signals.go:204] [ 812: 814] Signal 812, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.778556 30210 task_exit.go:204] [ 812: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.778566 30210 task_exit.go:204] [ 812: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.778572 30210 task_exit.go:204] [ 812: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.778585 30210 task_exit.go:204] [ 812: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.778630 30210 task_exit.go:204] [ 812: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.778649 30210 task_exit.go:204] [ 812: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.779662 30210 task_exit.go:204] [ 812: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.779697 30210 task_exit.go:204] [ 812: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.779711 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.779737 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.779746 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.779962 30210 task_exit.go:204] [ 812: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.780074 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:44.780249 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:44.781675 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.783503 30210 syscalls.go:262] [ 817: 817] Allocating stack with size of 8388608 bytes D0712 20:23:44.783712 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.785263 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.785333 30210 usertrap_amd64.go:106] [ 817: 817] Map a usertrap vma at 69000 D0712 20:23:44.785438 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 1 D0712 20:23:44.785489 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.785916 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.785947 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 2 D0712 20:23:44.785961 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.789806 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.789834 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 3 D0712 20:23:44.789855 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.796317 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.796366 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 4 D0712 20:23:44.796385 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.797927 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.797952 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 5 D0712 20:23:44.797962 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.798006 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.798029 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 6 D0712 20:23:44.798038 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.798317 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.798335 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 7 D0712 20:23:44.798341 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.798518 30210 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.798553 30210 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc0003d3f80 8 D0712 20:23:44.798567 30210 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.798789 30210 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.798813 30210 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc0003d3f80 9 D0712 20:23:44.798830 30210 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.798883 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.798892 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 10 D0712 20:23:44.798901 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.799087 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:44.799110 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 11 D0712 20:23:44.799118 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.807434 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.807460 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 12 D0712 20:23:44.807475 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.810009 30210 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.810038 30210 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc0003d3f80 13 D0712 20:23:44.810050 30210 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.810117 30210 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.810132 30210 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc0003d3f80 14 D0712 20:23:44.810143 30210 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.810179 30210 task_signals.go:470] [ 817: 817] Notified of signal 23 D0712 20:23:44.810251 30210 task_signals.go:220] [ 817: 817] Signal 23: delivering to handler I0712 20:23:44.817631 30210 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0712 20:23:44.817712 30210 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.817725 30210 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc0003d3f80 15 D0712 20:23:44.817733 30210 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 20:23:44.817774 30210 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.817806 30210 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.817831 30210 task_signals.go:204] [ 817: 820] Signal 817, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.817849 30210 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.817854 30210 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.817858 30210 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.817854 30210 task_signals.go:204] [ 817: 819] Signal 817, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.817927 30210 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.817956 30210 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.817962 30210 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.817935 30210 task_signals.go:204] [ 817: 821] Signal 817, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.817991 30210 task_signals.go:204] [ 817: 818] Signal 817, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.818002 30210 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.817903 30210 task_signals.go:204] [ 817: 822] Signal 817, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.818029 30210 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.818056 30210 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.818085 30210 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.818100 30210 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.818118 30210 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.818141 30210 task_exit.go:204] [ 817: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.820176 30210 task_exit.go:204] [ 817: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.820212 30210 task_exit.go:204] [ 817: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.820231 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.820262 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.820273 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.820420 30210 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.821097 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.822709 30210 syscalls.go:262] [ 823: 823] Allocating stack with size of 8388608 bytes D0712 20:23:44.822868 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.824191 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.824236 30210 usertrap_amd64.go:106] [ 823: 823] Map a usertrap vma at 69000 D0712 20:23:44.824345 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 1 D0712 20:23:44.824376 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.824723 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.824749 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 2 D0712 20:23:44.824761 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.825394 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.825424 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 3 D0712 20:23:44.825434 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.832868 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.832976 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 4 D0712 20:23:44.833041 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.836332 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.836362 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 5 D0712 20:23:44.836374 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.836425 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.836435 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 6 D0712 20:23:44.836453 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.836704 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.836729 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 7 D0712 20:23:44.836737 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.836915 30210 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.836968 30210 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc0005e3830 8 D0712 20:23:44.836982 30210 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.837085 30210 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.837112 30210 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc0005e3830 9 D0712 20:23:44.837122 30210 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.837251 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.837281 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 10 D0712 20:23:44.837292 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.847493 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.847546 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 11 D0712 20:23:44.847571 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.848416 30210 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.848450 30210 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc0005e3830 12 D0712 20:23:44.848464 30210 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.848537 30210 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.848547 30210 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc0005e3830 13 D0712 20:23:44.848556 30210 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.848611 30210 task_signals.go:470] [ 823: 823] Notified of signal 23 D0712 20:23:44.861726 30210 task_signals.go:220] [ 823: 823] Signal 23: delivering to handler I0712 20:23:44.873383 30210 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0712 20:23:44.873523 30210 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.873554 30210 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc0005e3830 14 D0712 20:23:44.873574 30210 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.873655 30210 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.873712 30210 task_signals.go:204] [ 823: 825] Signal 823, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.873730 30210 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.873759 30210 task_signals.go:204] [ 823: 827] Signal 823, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.873765 30210 task_signals.go:204] [ 823: 826] Signal 823, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.873778 30210 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.873790 30210 task_signals.go:204] [ 823: 824] Signal 823, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.873812 30210 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.873821 30210 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.873839 30210 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.873854 30210 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.873860 30210 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.873871 30210 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.873885 30210 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.873902 30210 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.873914 30210 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.875615 30210 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.875784 30210 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.875825 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.875866 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.875954 30210 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.876680 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.878347 30210 syscalls.go:262] [ 828: 828] Allocating stack with size of 8388608 bytes D0712 20:23:44.878497 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.879689 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.879736 30210 usertrap_amd64.go:106] [ 828: 828] Map a usertrap vma at 62000 D0712 20:23:44.880192 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 1 D0712 20:23:44.880235 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:44.880620 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.880647 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 2 D0712 20:23:44.880662 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:44.881413 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.881469 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 3 D0712 20:23:44.881486 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:44.888416 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.888447 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 4 D0712 20:23:44.888465 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:44.889695 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.889727 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 5 D0712 20:23:44.889741 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:44.889876 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.889898 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 6 D0712 20:23:44.889909 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:44.890222 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.890249 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 7 D0712 20:23:44.890258 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:44.890440 30210 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.890463 30210 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc0005e3a10 8 D0712 20:23:44.890472 30210 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:44.890545 30210 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.890563 30210 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc0005e3a10 9 D0712 20:23:44.890572 30210 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:44.890735 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.890788 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 10 D0712 20:23:44.890826 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:44.898428 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.898457 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 11 D0712 20:23:44.898467 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:44.901340 30210 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.901369 30210 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc0005e3a10 12 D0712 20:23:44.901388 30210 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:44.901482 30210 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.901511 30210 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc0005e3a10 13 D0712 20:23:44.901524 30210 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:44.901661 30210 task_signals.go:470] [ 828: 828] Notified of signal 23 D0712 20:23:44.901741 30210 task_signals.go:220] [ 828: 828] Signal 23: delivering to handler I0712 20:23:44.909982 30210 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0712 20:23:44.910109 30210 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.910132 30210 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc0005e3a10 14 D0712 20:23:44.910149 30210 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:44.910239 30210 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.910265 30210 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.910290 30210 task_signals.go:204] [ 828: 830] Signal 828, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.910308 30210 task_signals.go:204] [ 828: 831] Signal 828, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.910323 30210 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.910333 30210 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.910339 30210 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.910359 30210 task_signals.go:204] [ 828: 832] Signal 828, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.910371 30210 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.910388 30210 task_signals.go:204] [ 828: 833] Signal 828, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.910403 30210 task_signals.go:204] [ 828: 829] Signal 828, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.910414 30210 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.910419 30210 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.910431 30210 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.910454 30210 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.910460 30210 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.910471 30210 task_exit.go:204] [ 828: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.910479 30210 task_exit.go:204] [ 828: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.910484 30210 task_exit.go:204] [ 828: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.910493 30210 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.912090 30210 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.912138 30210 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.912159 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.912209 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.912242 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.912320 30210 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.912995 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.914616 30210 syscalls.go:262] [ 834: 834] Allocating stack with size of 8388608 bytes D0712 20:23:44.914782 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.916286 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.916330 30210 usertrap_amd64.go:106] [ 834: 834] Map a usertrap vma at 61000 D0712 20:23:44.916799 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 1 D0712 20:23:44.916857 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.917389 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.917438 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 2 D0712 20:23:44.917452 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.918316 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.918349 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 3 D0712 20:23:44.918361 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.925192 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.925221 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 4 D0712 20:23:44.925233 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.926552 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.926581 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 5 D0712 20:23:44.926591 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.926648 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.926660 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 6 D0712 20:23:44.926668 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.926883 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.926906 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 7 D0712 20:23:44.926914 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.927171 30210 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.927200 30210 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc001e1e840 8 D0712 20:23:44.927214 30210 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.927695 30210 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.927745 30210 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc001e1e840 9 D0712 20:23:44.927802 30210 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.927883 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.927914 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 10 D0712 20:23:44.927958 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.937263 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.937298 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 11 D0712 20:23:44.937308 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.940151 30210 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.940202 30210 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc001e1e840 12 D0712 20:23:44.940226 30210 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.940356 30210 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.940481 30210 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc001e1e840 13 D0712 20:23:44.940733 30210 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.942848 30210 task_signals.go:470] [ 834: 834] Notified of signal 23 D0712 20:23:44.943337 30210 task_signals.go:220] [ 834: 834] Signal 23: delivering to handler D0712 20:23:44.952572 30210 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.952610 30210 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc001e1e840 14 D0712 20:23:44.952628 30210 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.952684 30210 task_exit.go:204] [ 834: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.952720 30210 task_signals.go:204] [ 834: 836] Signal 834, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.952740 30210 task_exit.go:204] [ 834: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.952760 30210 task_signals.go:204] [ 834: 837] Signal 834, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.952774 30210 task_signals.go:204] [ 834: 838] Signal 834, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.952785 30210 task_exit.go:204] [ 834: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.952796 30210 task_signals.go:204] [ 834: 835] Signal 834, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.952808 30210 task_exit.go:204] [ 834: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.952814 30210 task_exit.go:204] [ 834: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.952829 30210 task_exit.go:204] [ 834: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.952836 30210 task_exit.go:204] [ 834: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.952841 30210 task_exit.go:204] [ 834: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.952855 30210 task_exit.go:204] [ 834: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.952863 30210 task_exit.go:204] [ 834: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.952869 30210 task_exit.go:204] [ 834: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.952881 30210 task_exit.go:204] [ 834: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.954377 30210 task_exit.go:204] [ 834: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.954399 30210 task_exit.go:204] [ 834: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.954438 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.954513 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:44.954522 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.954628 30210 task_exit.go:204] [ 834: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.955480 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.957153 30210 syscalls.go:262] [ 839: 839] Allocating stack with size of 8388608 bytes D0712 20:23:44.957422 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.959836 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.959922 30210 usertrap_amd64.go:106] [ 839: 839] Map a usertrap vma at 6a000 D0712 20:23:44.960088 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 1 D0712 20:23:44.960129 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:44.960500 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.960533 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 2 D0712 20:23:44.960549 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:44.961714 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.961750 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 3 D0712 20:23:44.961768 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:44.969397 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.969450 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 4 D0712 20:23:44.969467 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:44.970894 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.970931 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 5 D0712 20:23:44.970945 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:44.971010 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.971020 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 6 D0712 20:23:44.971026 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:44.971487 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.971551 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 7 D0712 20:23:44.971573 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:44.971766 30210 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.971789 30210 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc001ec4060 8 D0712 20:23:44.971799 30210 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:44.971987 30210 usertrap_amd64.go:212] [ 839: 841] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.972021 30210 usertrap_amd64.go:122] [ 839: 841] Allocate a new trap: 0xc001ec4060 9 D0712 20:23:44.972033 30210 usertrap_amd64.go:225] [ 839: 841] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:44.972184 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.972209 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 10 D0712 20:23:44.972224 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:44.981847 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.981889 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 11 D0712 20:23:44.981906 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:44.982627 30210 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.982665 30210 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc001ec4060 12 D0712 20:23:44.982681 30210 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:44.982890 30210 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.982925 30210 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc001ec4060 13 D0712 20:23:44.982936 30210 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:44.983058 30210 task_signals.go:470] [ 839: 839] Notified of signal 23 D0712 20:23:44.983236 30210 task_signals.go:220] [ 839: 839] Signal 23: delivering to handler D0712 20:23:44.983379 30210 task_signals.go:481] [ 839: 839] No task notified of signal 23 D0712 20:23:44.983447 30210 task_signals.go:220] [ 839: 839] Signal 23: delivering to handler D0712 20:23:44.994165 30210 task_signals.go:470] [ 839: 839] Notified of signal 23 D0712 20:23:44.997010 30210 task_signals.go:220] [ 839: 839] Signal 23: delivering to handler I0712 20:23:45.000511 30210 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0712 20:23:45.000754 30210 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.000793 30210 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc001ec4060 14 D0712 20:23:45.000813 30210 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.001018 30210 task_exit.go:204] [ 839: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.001064 30210 task_exit.go:204] [ 839: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.001099 30210 task_signals.go:204] [ 839: 842] Signal 839, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.001117 30210 task_exit.go:204] [ 839: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.001126 30210 task_exit.go:204] [ 839: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.001133 30210 task_exit.go:204] [ 839: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.001173 30210 task_signals.go:204] [ 839: 841] Signal 839, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.001210 30210 task_exit.go:204] [ 839: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.001235 30210 task_signals.go:204] [ 839: 840] Signal 839, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.001265 30210 task_exit.go:204] [ 839: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.001282 30210 task_exit.go:204] [ 839: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.001309 30210 task_exit.go:204] [ 839: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.001314 30210 task_signals.go:204] [ 839: 843] Signal 839, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.001327 30210 task_exit.go:204] [ 839: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.001379 30210 task_exit.go:204] [ 839: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.001413 30210 task_exit.go:204] [ 839: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.002753 30210 task_exit.go:204] [ 839: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.002788 30210 task_exit.go:204] [ 839: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.002810 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.002871 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.002918 30210 task_exit.go:204] [ 839: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.003838 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.005563 30210 syscalls.go:262] [ 844: 844] Allocating stack with size of 8388608 bytes D0712 20:23:45.005772 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.007499 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.007557 30210 usertrap_amd64.go:106] [ 844: 844] Map a usertrap vma at 65000 D0712 20:23:45.007679 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 1 D0712 20:23:45.007748 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:45.008291 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.008311 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 2 D0712 20:23:45.008324 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:45.009238 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.009276 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 3 D0712 20:23:45.009291 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:45.016696 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.016743 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 4 D0712 20:23:45.016761 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:45.018478 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.018516 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 5 D0712 20:23:45.018531 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:45.018579 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.018587 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 6 D0712 20:23:45.018596 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:45.018855 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.018878 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 7 D0712 20:23:45.018889 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:45.019141 30210 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.019196 30210 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc001e1ee70 8 D0712 20:23:45.019218 30210 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:45.019435 30210 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.019456 30210 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc001e1ee70 9 D0712 20:23:45.019467 30210 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:45.019479 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.019485 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 10 D0712 20:23:45.019492 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:45.030030 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.030087 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 11 D0712 20:23:45.030103 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:45.030285 30210 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.030349 30210 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc001e1ee70 12 D0712 20:23:45.030404 30210 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:45.030471 30210 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.030497 30210 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc001e1ee70 13 D0712 20:23:45.030511 30210 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:45.030577 30210 task_signals.go:470] [ 844: 844] Notified of signal 23 D0712 20:23:45.030630 30210 task_signals.go:220] [ 844: 844] Signal 23: delivering to handler D0712 20:23:45.042238 30210 task_signals.go:470] [ 844: 844] Notified of signal 23 D0712 20:23:45.042671 30210 task_signals.go:220] [ 844: 844] Signal 23: delivering to handler I0712 20:23:45.043207 30210 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0712 20:23:45.043393 30210 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.043419 30210 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc001e1ee70 14 D0712 20:23:45.043440 30210 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:45.043493 30210 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.043517 30210 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.043538 30210 task_signals.go:204] [ 844: 845] Signal 844, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.043572 30210 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.043587 30210 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.043605 30210 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.043632 30210 task_signals.go:204] [ 844: 847] Signal 844, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.043653 30210 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.043666 30210 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.043672 30210 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.043693 30210 task_signals.go:204] [ 844: 848] Signal 844, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.043700 30210 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.043706 30210 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.043709 30210 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.043718 30210 task_signals.go:204] [ 844: 846] Signal 844, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.043734 30210 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.045467 30210 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.045485 30210 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.045500 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.046016 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.046100 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.046501 30210 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.047424 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.049192 30210 syscalls.go:262] [ 849: 849] Allocating stack with size of 8388608 bytes D0712 20:23:45.049507 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.055076 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.055162 30210 usertrap_amd64.go:106] [ 849: 849] Map a usertrap vma at 64000 D0712 20:23:45.055357 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 1 D0712 20:23:45.055439 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:45.055882 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.055918 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 2 D0712 20:23:45.055933 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:45.057338 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.057373 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 3 D0712 20:23:45.057386 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:45.064135 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.064181 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 4 D0712 20:23:45.064198 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:45.065844 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.065873 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 5 D0712 20:23:45.065886 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:45.065948 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.065966 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 6 D0712 20:23:45.065975 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:45.066167 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.066201 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 7 D0712 20:23:45.066211 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:45.066481 30210 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.066545 30210 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001ec4450 8 D0712 20:23:45.066571 30210 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:45.066953 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.066995 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 9 D0712 20:23:45.067014 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:45.067032 30210 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.067040 30210 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001ec4450 10 D0712 20:23:45.067097 30210 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b6e0 trap addr 64320 ([184 24 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:45.067172 30210 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.067191 30210 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001ec4450 11 D0712 20:23:45.067207 30210 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:45.075216 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.075244 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 12 D0712 20:23:45.075253 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:45.078166 30210 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.078209 30210 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001ec4450 13 D0712 20:23:45.078226 30210 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:45.078272 30210 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.078280 30210 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001ec4450 14 D0712 20:23:45.078324 30210 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:45.078382 30210 task_signals.go:470] [ 849: 849] Notified of signal 23 D0712 20:23:45.078475 30210 task_signals.go:220] [ 849: 849] Signal 23: delivering to handler D0712 20:23:45.087092 30210 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.087142 30210 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001ec4450 15 D0712 20:23:45.087161 30210 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 20:23:45.087245 30210 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.087283 30210 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.087325 30210 task_signals.go:204] [ 849: 850] Signal 849, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.087354 30210 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.087364 30210 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.087377 30210 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.087404 30210 task_signals.go:204] [ 849: 851] Signal 849, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.087428 30210 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.087441 30210 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.087450 30210 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.087470 30210 task_signals.go:204] [ 849: 852] Signal 849, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.087485 30210 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.087492 30210 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.087497 30210 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.087514 30210 task_signals.go:204] [ 849: 853] Signal 849, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.087521 30210 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.088871 30210 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.088911 30210 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.088930 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.088998 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.089010 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.089248 30210 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.090104 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.091867 30210 syscalls.go:262] [ 854: 854] Allocating stack with size of 8388608 bytes D0712 20:23:45.091960 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.093845 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.093896 30210 usertrap_amd64.go:106] [ 854: 854] Map a usertrap vma at 60000 D0712 20:23:45.093998 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 1 D0712 20:23:45.094049 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:45.094554 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.094580 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 2 D0712 20:23:45.094591 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:45.095908 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.095942 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 3 D0712 20:23:45.095956 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:45.104242 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.104272 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 4 D0712 20:23:45.104283 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:45.106008 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.106038 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 5 D0712 20:23:45.106047 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:45.106121 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.106132 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 6 D0712 20:23:45.106141 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:45.106611 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.106638 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 7 D0712 20:23:45.106646 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:45.106837 30210 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.106860 30210 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000a795f0 8 D0712 20:23:45.106870 30210 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:45.107068 30210 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.107087 30210 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000a795f0 9 D0712 20:23:45.107094 30210 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:45.107308 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.107353 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 10 D0712 20:23:45.107420 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:45.116555 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.116593 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 11 D0712 20:23:45.116606 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:45.119276 30210 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.119306 30210 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000a795f0 12 D0712 20:23:45.119318 30210 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:45.119414 30210 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.119425 30210 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000a795f0 13 D0712 20:23:45.119435 30210 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:45.119454 30210 task_signals.go:470] [ 854: 854] Notified of signal 23 D0712 20:23:45.119552 30210 task_signals.go:220] [ 854: 854] Signal 23: delivering to handler I0712 20:23:45.128107 30210 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0712 20:23:45.128439 30210 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.128463 30210 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000a795f0 14 D0712 20:23:45.128494 30210 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:45.128553 30210 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.128581 30210 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.128599 30210 task_signals.go:204] [ 854: 855] Signal 854, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.128620 30210 task_signals.go:204] [ 854: 858] Signal 854, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.128607 30210 task_signals.go:204] [ 854: 857] Signal 854, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.128633 30210 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.128643 30210 task_signals.go:204] [ 854: 856] Signal 854, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.128656 30210 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.128663 30210 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.128676 30210 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.128696 30210 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.128714 30210 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.128725 30210 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.128750 30210 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.128782 30210 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.128797 30210 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.130145 30210 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.130174 30210 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.130188 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.130219 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.130279 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.130406 30210 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.131068 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.132528 30210 syscalls.go:262] [ 859: 859] Allocating stack with size of 8388608 bytes D0712 20:23:45.132781 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.134145 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.134242 30210 usertrap_amd64.go:106] [ 859: 859] Map a usertrap vma at 64000 D0712 20:23:45.134330 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 1 D0712 20:23:45.134364 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:45.134754 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.134837 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 2 D0712 20:23:45.134854 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:45.135424 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.135453 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 3 D0712 20:23:45.135465 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:45.141245 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.141282 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 4 D0712 20:23:45.141292 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:45.142376 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.142400 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 5 D0712 20:23:45.142409 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:45.142424 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.142432 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 6 D0712 20:23:45.142490 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:45.143086 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.143112 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 7 D0712 20:23:45.143136 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:45.143301 30210 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.143329 30210 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0007dffb0 8 D0712 20:23:45.143345 30210 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:45.143717 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.143744 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 9 D0712 20:23:45.143757 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:45.143805 30210 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.143829 30210 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0007dffb0 10 D0712 20:23:45.143840 30210 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:45.151392 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.151425 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 11 D0712 20:23:45.151436 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:45.154394 30210 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.154431 30210 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0007dffb0 12 D0712 20:23:45.154447 30210 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:45.154479 30210 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.154488 30210 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0007dffb0 13 D0712 20:23:45.154498 30210 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:45.154516 30210 task_signals.go:470] [ 859: 859] Notified of signal 23 D0712 20:23:45.154591 30210 task_signals.go:220] [ 859: 859] Signal 23: delivering to handler I0712 20:23:45.161739 30210 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0712 20:23:45.161849 30210 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.161864 30210 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0007dffb0 14 D0712 20:23:45.161877 30210 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:45.161950 30210 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.161987 30210 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.162005 30210 task_signals.go:204] [ 859: 860] Signal 859, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.162069 30210 task_signals.go:204] [ 859: 861] Signal 859, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.162073 30210 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.162005 30210 task_signals.go:204] [ 859: 862] Signal 859, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.162017 30210 task_signals.go:204] [ 859: 863] Signal 859, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.162097 30210 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.162108 30210 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.162129 30210 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.162137 30210 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.162149 30210 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.162168 30210 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.162193 30210 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.162304 30210 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.162335 30210 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.163381 30210 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.163429 30210 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.163444 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.163509 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.163520 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.163719 30210 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.164789 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.166242 30210 syscalls.go:262] [ 864: 864] Allocating stack with size of 8388608 bytes D0712 20:23:45.166470 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.167569 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.167695 30210 usertrap_amd64.go:106] [ 864: 864] Map a usertrap vma at 6a000 D0712 20:23:45.167875 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 1 D0712 20:23:45.167916 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:45.168478 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.168534 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 2 D0712 20:23:45.168555 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:45.169526 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.169554 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 3 D0712 20:23:45.169568 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:45.175971 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.176005 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 4 D0712 20:23:45.176018 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:45.177255 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.177294 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 5 D0712 20:23:45.177311 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:45.177375 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.177399 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 6 D0712 20:23:45.177409 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:45.177758 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.177788 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 7 D0712 20:23:45.177801 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:45.177924 30210 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.177935 30210 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0013bf9b0 8 D0712 20:23:45.177944 30210 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:45.178070 30210 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.178090 30210 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0013bf9b0 9 D0712 20:23:45.178106 30210 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:45.178262 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.178287 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 10 D0712 20:23:45.178298 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:45.178970 30210 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.179003 30210 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0013bf9b0 11 D0712 20:23:45.179011 30210 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:45.179104 30210 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.179137 30210 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0013bf9b0 12 D0712 20:23:45.179151 30210 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:45.179209 30210 task_signals.go:470] [ 864: 864] Notified of signal 23 D0712 20:23:45.179257 30210 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0712 20:23:45.186522 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.186550 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 13 D0712 20:23:45.186561 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) executing program D0712 20:23:45.187232 30210 task_signals.go:470] [ 7: 17] Notified of signal 23 D0712 20:23:45.187287 30210 task_signals.go:179] [ 7: 17] Restarting syscall 202: interrupted by signal 23 D0712 20:23:45.187300 30210 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0712 20:23:45.189663 30210 task_signals.go:470] [ 864: 864] Notified of signal 23 D0712 20:23:45.189743 30210 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0712 20:23:45.197232 30210 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.197264 30210 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0013bf9b0 14 D0712 20:23:45.197275 30210 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.197329 30210 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.197347 30210 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.197392 30210 task_signals.go:204] [ 864: 865] Signal 864, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.197406 30210 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.197394 30210 task_signals.go:204] [ 864: 866] Signal 864, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.197414 30210 task_signals.go:204] [ 864: 867] Signal 864, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.197424 30210 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.197436 30210 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.197508 30210 task_signals.go:204] [ 864: 868] Signal 864, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.197529 30210 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.197556 30210 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.197561 30210 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.197568 30210 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.197579 30210 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.197586 30210 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.197600 30210 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.198750 30210 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.198794 30210 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.198804 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.198831 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.198851 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.198961 30210 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.199897 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.201720 30210 syscalls.go:262] [ 869: 869] Allocating stack with size of 8388608 bytes D0712 20:23:45.202032 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.203853 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.203898 30210 usertrap_amd64.go:106] [ 869: 869] Map a usertrap vma at 62000 D0712 20:23:45.203998 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 1 D0712 20:23:45.204018 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:45.204554 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.204581 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 2 D0712 20:23:45.204592 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:45.207118 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.207283 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 3 D0712 20:23:45.207341 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:45.214162 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.214205 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 4 D0712 20:23:45.214257 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:45.216478 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.216503 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 5 D0712 20:23:45.216517 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:45.216670 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.216704 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 6 D0712 20:23:45.216761 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:45.217134 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.217166 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 7 D0712 20:23:45.217177 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:45.217596 30210 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.217678 30210 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc001f683f0 8 D0712 20:23:45.217700 30210 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:45.218320 30210 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.218351 30210 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc001f683f0 9 D0712 20:23:45.218360 30210 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:45.218402 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.218422 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 10 D0712 20:23:45.218437 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:45.226656 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.226675 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 11 D0712 20:23:45.226686 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:45.229162 30210 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.229194 30210 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc001f683f0 12 D0712 20:23:45.229206 30210 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:45.229321 30210 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.229330 30210 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc001f683f0 13 D0712 20:23:45.229339 30210 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:45.229425 30210 task_signals.go:470] [ 869: 869] Notified of signal 23 D0712 20:23:45.229542 30210 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0712 20:23:45.237386 30210 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.237434 30210 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc001f683f0 14 D0712 20:23:45.237452 30210 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:45.237575 30210 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.237619 30210 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.237743 30210 task_signals.go:204] [ 869: 870] Signal 869, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.237788 30210 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.237800 30210 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.237814 30210 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.237835 30210 task_signals.go:204] [ 869: 873] Signal 869, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.237845 30210 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.237852 30210 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.237875 30210 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.237912 30210 task_signals.go:204] [ 869: 871] Signal 869, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.237847 30210 task_signals.go:204] [ 869: 872] Signal 869, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.237944 30210 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.237986 30210 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.238025 30210 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.238054 30210 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.239463 30210 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.239500 30210 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.239587 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.239767 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.239795 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.240049 30210 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.240294 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:45.240572 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:45.241506 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:45.241544 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:45.242160 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.244305 30210 syscalls.go:262] [ 874: 874] Allocating stack with size of 8388608 bytes D0712 20:23:45.244674 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.248584 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.248677 30210 usertrap_amd64.go:106] [ 874: 874] Map a usertrap vma at 6a000 D0712 20:23:45.248764 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 1 D0712 20:23:45.248794 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:45.249081 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.249115 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 2 D0712 20:23:45.249126 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:45.250580 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.250608 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 3 D0712 20:23:45.250622 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:45.258450 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.258498 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 4 D0712 20:23:45.258511 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:45.259949 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.259986 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 5 D0712 20:23:45.260034 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:45.260207 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.260232 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 6 D0712 20:23:45.260241 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:45.260720 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.260746 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 7 D0712 20:23:45.260754 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:45.261114 30210 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.261163 30210 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc001233260 8 D0712 20:23:45.261181 30210 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:45.261550 30210 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.261571 30210 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc001233260 9 D0712 20:23:45.261585 30210 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:45.261866 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.261917 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 10 D0712 20:23:45.261937 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:45.269567 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.269596 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 11 D0712 20:23:45.269607 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:45.273084 30210 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.273142 30210 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc001233260 12 D0712 20:23:45.273154 30210 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:45.273191 30210 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.273205 30210 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc001233260 13 D0712 20:23:45.273214 30210 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:45.273235 30210 task_signals.go:470] [ 874: 874] Notified of signal 23 D0712 20:23:45.273316 30210 task_signals.go:220] [ 874: 874] Signal 23: delivering to handler D0712 20:23:45.280049 30210 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.280083 30210 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc001233260 14 D0712 20:23:45.280095 30210 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.280132 30210 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.280149 30210 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.280174 30210 task_signals.go:204] [ 874: 877] Signal 874, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.280185 30210 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.280190 30210 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.280193 30210 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.280216 30210 task_signals.go:204] [ 874: 878] Signal 874, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.280216 30210 task_signals.go:204] [ 874: 876] Signal 874, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.280229 30210 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.280247 30210 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.280267 30210 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.280282 30210 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.280290 30210 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.280295 30210 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.280322 30210 task_signals.go:204] [ 874: 875] Signal 874, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.280335 30210 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.281504 30210 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.281523 30210 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.281535 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.281655 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.281683 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.281844 30210 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.282691 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.284245 30210 syscalls.go:262] [ 879: 879] Allocating stack with size of 8388608 bytes D0712 20:23:45.284425 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.285147 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.285187 30210 usertrap_amd64.go:106] [ 879: 879] Map a usertrap vma at 6a000 D0712 20:23:45.285354 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 1 D0712 20:23:45.285387 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:45.285705 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.285723 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 2 D0712 20:23:45.285731 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:45.286230 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.286250 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 3 D0712 20:23:45.286258 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:45.292057 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.292093 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 4 D0712 20:23:45.292124 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:45.293216 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.293248 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 5 D0712 20:23:45.293260 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:45.293360 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.293383 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 6 D0712 20:23:45.293393 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:45.293769 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.293787 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 7 D0712 20:23:45.293799 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:45.293927 30210 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.293949 30210 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc001e1fb90 8 D0712 20:23:45.293960 30210 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:45.294092 30210 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.294122 30210 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc001e1fb90 9 D0712 20:23:45.294218 30210 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:45.294290 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.294303 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 10 D0712 20:23:45.294352 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:45.301875 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.301893 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 11 D0712 20:23:45.301906 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:45.305784 30210 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.305808 30210 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc001e1fb90 12 D0712 20:23:45.305820 30210 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:45.305859 30210 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.305866 30210 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc001e1fb90 13 D0712 20:23:45.305875 30210 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:45.305890 30210 task_signals.go:470] [ 879: 879] Notified of signal 23 D0712 20:23:45.306003 30210 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0712 20:23:45.312628 30210 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.312667 30210 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc001e1fb90 14 D0712 20:23:45.312680 30210 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.312740 30210 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.312779 30210 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.312798 30210 task_signals.go:204] [ 879: 882] Signal 879, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.312820 30210 task_signals.go:204] [ 879: 881] Signal 879, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.312822 30210 task_signals.go:204] [ 879: 883] Signal 879, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.312834 30210 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.312847 30210 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.312854 30210 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.312798 30210 task_signals.go:204] [ 879: 880] Signal 879, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.312885 30210 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.312893 30210 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.312928 30210 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.312984 30210 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.313007 30210 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.313133 30210 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.313151 30210 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.314054 30210 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.314079 30210 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.314098 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.314129 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.314150 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.314197 30210 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.318997 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.326707 30210 task_signals.go:481] [ 7: 12] No task notified of signal 23 D0712 20:23:45.328889 30210 syscalls.go:262] [ 884: 884] Allocating stack with size of 8388608 bytes D0712 20:23:45.329185 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.329356 30210 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0712 20:23:45.329571 30210 task_signals.go:470] [ 7: 12] Notified of signal 23 D0712 20:23:45.329668 30210 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0712 20:23:45.330195 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.330238 30210 usertrap_amd64.go:106] [ 884: 884] Map a usertrap vma at 63000 D0712 20:23:45.330330 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 1 D0712 20:23:45.330366 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:45.330565 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.330579 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 2 D0712 20:23:45.330584 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:45.330940 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.330956 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 3 D0712 20:23:45.330962 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:45.336116 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.336135 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 4 D0712 20:23:45.336151 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:45.337181 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.337210 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 5 D0712 20:23:45.337220 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:45.337273 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.337320 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 6 D0712 20:23:45.337328 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:45.337848 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.337874 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 7 D0712 20:23:45.337901 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:45.338036 30210 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.338052 30210 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc0013be030 8 D0712 20:23:45.338058 30210 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:45.338223 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.338240 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 9 D0712 20:23:45.338249 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:45.338263 30210 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.338269 30210 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc0013be030 10 D0712 20:23:45.338277 30210 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:45.338537 30210 usertrap_amd64.go:212] [ 884: 887] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.338664 30210 usertrap_amd64.go:122] [ 884: 887] Allocate a new trap: 0xc0013be030 11 D0712 20:23:45.338712 30210 usertrap_amd64.go:225] [ 884: 887] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:45.345599 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.345624 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 12 D0712 20:23:45.345640 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:45.348818 30210 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.348859 30210 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc0013be030 13 D0712 20:23:45.348930 30210 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:45.349038 30210 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.349054 30210 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc0013be030 14 D0712 20:23:45.349060 30210 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:45.349081 30210 task_signals.go:470] [ 884: 884] Notified of signal 23 D0712 20:23:45.349146 30210 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0712 20:23:45.355629 30210 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.355664 30210 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc0013be030 15 D0712 20:23:45.355677 30210 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:23:45.355758 30210 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.355778 30210 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.355802 30210 task_signals.go:204] [ 884: 887] Signal 884, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.355816 30210 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.355825 30210 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.355815 30210 task_signals.go:204] [ 884: 886] Signal 884, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.355832 30210 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.355864 30210 task_signals.go:204] [ 884: 885] Signal 884, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.355876 30210 task_signals.go:204] [ 884: 888] Signal 884, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.355906 30210 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.355964 30210 task_signals.go:204] [ 884: 889] Signal 884, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.356001 30210 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.356008 30210 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.356019 30210 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.356028 30210 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.356031 30210 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.356049 30210 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.356069 30210 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.356074 30210 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.356083 30210 task_exit.go:204] [ 884: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.357286 30210 task_exit.go:204] [ 884: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.357315 30210 task_exit.go:204] [ 884: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.357332 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.357355 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.357366 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.357509 30210 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.358399 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.359778 30210 syscalls.go:262] [ 890: 890] Allocating stack with size of 8388608 bytes D0712 20:23:45.360049 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.361995 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.362047 30210 usertrap_amd64.go:106] [ 890: 890] Map a usertrap vma at 69000 D0712 20:23:45.362174 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 1 D0712 20:23:45.362212 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.362640 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.362665 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 2 D0712 20:23:45.362675 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.363267 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.363292 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 3 D0712 20:23:45.363302 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.369215 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.369240 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 4 D0712 20:23:45.369249 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.370234 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.370256 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 5 D0712 20:23:45.370264 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.370312 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.370332 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 6 D0712 20:23:45.370355 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.370608 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.370628 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 7 D0712 20:23:45.370633 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.370758 30210 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.370769 30210 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0013be3c0 8 D0712 20:23:45.370776 30210 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.370926 30210 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.370945 30210 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0013be3c0 9 D0712 20:23:45.370954 30210 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.371011 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.371030 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 10 D0712 20:23:45.371038 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.378390 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.378438 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 11 D0712 20:23:45.378455 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.381291 30210 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.381324 30210 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0013be3c0 12 D0712 20:23:45.381340 30210 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.381386 30210 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.381410 30210 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0013be3c0 13 D0712 20:23:45.381421 30210 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.381476 30210 task_signals.go:470] [ 890: 890] Notified of signal 23 D0712 20:23:45.381622 30210 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0712 20:23:45.389248 30210 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.389280 30210 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0013be3c0 14 D0712 20:23:45.389294 30210 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.389348 30210 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.389426 30210 task_signals.go:204] [ 890: 892] Signal 890, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.389452 30210 task_signals.go:204] [ 890: 894] Signal 890, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.389461 30210 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.389508 30210 task_signals.go:204] [ 890: 893] Signal 890, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.389529 30210 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.389597 30210 task_signals.go:204] [ 890: 891] Signal 890, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.389633 30210 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.389641 30210 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.389657 30210 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.389686 30210 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.389699 30210 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.389711 30210 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.389727 30210 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.389733 30210 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.389742 30210 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.390971 30210 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.391012 30210 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.391028 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.391097 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.391129 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.391473 30210 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.391662 30210 task_signals.go:470] [ 7: 12] Notified of signal 23 D0712 20:23:45.391700 30210 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0712 20:23:45.392248 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.393818 30210 syscalls.go:262] [ 895: 895] Allocating stack with size of 8388608 bytes D0712 20:23:45.394153 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.395658 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.395706 30210 usertrap_amd64.go:106] [ 895: 895] Map a usertrap vma at 67000 D0712 20:23:45.395865 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 1 D0712 20:23:45.395910 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:45.396421 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.396444 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 2 D0712 20:23:45.396453 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:45.396908 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.396967 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 3 D0712 20:23:45.396979 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:45.402824 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.402919 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 4 D0712 20:23:45.402948 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:45.404235 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.404274 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 5 D0712 20:23:45.404285 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:45.404355 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.404362 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 6 D0712 20:23:45.404367 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:45.404657 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.404675 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 7 D0712 20:23:45.404681 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:45.404789 30210 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.404810 30210 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001f68480 8 D0712 20:23:45.404820 30210 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:45.405000 30210 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.405035 30210 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001f68480 9 D0712 20:23:45.405047 30210 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:45.405152 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.405167 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 10 D0712 20:23:45.405177 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:45.411855 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.411885 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 11 D0712 20:23:45.411896 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:45.415503 30210 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.415537 30210 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001f68480 12 D0712 20:23:45.415550 30210 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:45.415674 30210 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.415698 30210 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001f68480 13 D0712 20:23:45.415728 30210 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:45.415769 30210 task_signals.go:470] [ 895: 895] Notified of signal 23 D0712 20:23:45.415826 30210 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0712 20:23:45.420982 30210 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.421015 30210 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001f68480 14 D0712 20:23:45.421029 30210 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:45.421086 30210 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.421110 30210 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.421131 30210 task_signals.go:204] [ 895: 898] Signal 895, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.421157 30210 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.421167 30210 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.421143 30210 task_signals.go:204] [ 895: 897] Signal 895, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.421163 30210 task_signals.go:204] [ 895: 899] Signal 895, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.421172 30210 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.421125 30210 task_signals.go:204] [ 895: 896] Signal 895, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.421222 30210 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.421233 30210 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.421255 30210 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.421272 30210 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.421283 30210 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.421298 30210 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.421311 30210 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.422352 30210 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.422387 30210 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.422398 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.422438 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.422473 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.422447 30210 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.423123 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.424646 30210 syscalls.go:262] [ 900: 900] Allocating stack with size of 8388608 bytes D0712 20:23:45.424743 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.425684 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.425720 30210 usertrap_amd64.go:106] [ 900: 900] Map a usertrap vma at 61000 D0712 20:23:45.425770 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 1 D0712 20:23:45.425787 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.425954 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.425969 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 2 D0712 20:23:45.425976 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.426291 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.426299 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 3 D0712 20:23:45.426304 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:45.431565 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.431596 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 4 D0712 20:23:45.431608 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:45.433030 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.433066 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 5 D0712 20:23:45.433080 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:45.433114 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.433122 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 6 D0712 20:23:45.433129 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:45.433387 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.433500 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 7 D0712 20:23:45.433517 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:45.434010 30210 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.434111 30210 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc000560240 8 D0712 20:23:45.434135 30210 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:45.434282 30210 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.434343 30210 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc000560240 9 D0712 20:23:45.434388 30210 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:45.434499 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.435137 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 10 D0712 20:23:45.435165 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:45.435542 30210 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.435571 30210 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc000560240 11 D0712 20:23:45.435583 30210 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:45.435620 30210 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.435632 30210 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc000560240 12 D0712 20:23:45.435642 30210 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:45.435708 30210 task_signals.go:470] [ 900: 900] Notified of signal 23 D0712 20:23:45.435761 30210 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0712 20:23:45.442432 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.442456 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 13 D0712 20:23:45.442464 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:45.446160 30210 task_signals.go:470] [ 900: 900] Notified of signal 23 D0712 20:23:45.446222 30210 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0712 20:23:45.452618 30210 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.452669 30210 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc000560240 14 D0712 20:23:45.452683 30210 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:45.452740 30210 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.452775 30210 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.452811 30210 task_signals.go:204] [ 900: 901] Signal 900, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.452829 30210 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.452836 30210 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.452841 30210 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.452858 30210 task_signals.go:204] [ 900: 902] Signal 900, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.452883 30210 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.452900 30210 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.452906 30210 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.452923 30210 task_signals.go:204] [ 900: 903] Signal 900, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.452984 30210 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.452994 30210 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.453000 30210 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.453014 30210 task_signals.go:204] [ 900: 904] Signal 900, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.453033 30210 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.454028 30210 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.454056 30210 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.454070 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.454104 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.454114 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.454259 30210 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.455054 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.456305 30210 syscalls.go:262] [ 905: 905] Allocating stack with size of 8388608 bytes D0712 20:23:45.456453 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.457390 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.457463 30210 usertrap_amd64.go:106] [ 905: 905] Map a usertrap vma at 60000 D0712 20:23:45.457584 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 1 D0712 20:23:45.457623 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:45.457825 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.457844 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 2 D0712 20:23:45.457854 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:45.458306 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.458325 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 3 D0712 20:23:45.458333 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:45.463713 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.463764 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 4 D0712 20:23:45.463776 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:45.464885 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.464915 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 5 D0712 20:23:45.464929 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:45.465252 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.465281 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 6 D0712 20:23:45.465294 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:45.465703 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.465721 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 7 D0712 20:23:45.465731 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:45.465860 30210 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.465883 30210 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0005605a0 8 D0712 20:23:45.465892 30210 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:45.466049 30210 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.466063 30210 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0005605a0 9 D0712 20:23:45.466073 30210 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:45.466150 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.466167 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 10 D0712 20:23:45.466175 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:45.473200 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.473235 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 11 D0712 20:23:45.473247 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:45.476846 30210 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.476882 30210 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0005605a0 12 D0712 20:23:45.476895 30210 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:45.476983 30210 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.476999 30210 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0005605a0 13 D0712 20:23:45.477010 30210 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:45.477025 30210 task_signals.go:470] [ 905: 905] Notified of signal 23 D0712 20:23:45.477083 30210 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0712 20:23:45.482244 30210 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.482281 30210 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0005605a0 14 D0712 20:23:45.482297 30210 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:45.482426 30210 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.482460 30210 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.482484 30210 task_signals.go:204] [ 905: 907] Signal 905, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.482499 30210 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.482506 30210 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.482512 30210 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.482527 30210 task_signals.go:204] [ 905: 906] Signal 905, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.482548 30210 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.482557 30210 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.482573 30210 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.482586 30210 task_signals.go:204] [ 905: 908] Signal 905, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.482607 30210 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.482616 30210 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.482622 30210 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.482645 30210 task_signals.go:204] [ 905: 909] Signal 905, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.482667 30210 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.483616 30210 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.483649 30210 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.483663 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.487563 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.487595 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.487835 30210 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.488425 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.490763 30210 syscalls.go:262] [ 910: 910] Allocating stack with size of 8388608 bytes D0712 20:23:45.490894 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.491892 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.491931 30210 usertrap_amd64.go:106] [ 910: 910] Map a usertrap vma at 61000 D0712 20:23:45.492024 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 1 D0712 20:23:45.492051 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.492419 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.492442 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 2 D0712 20:23:45.492453 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.493006 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.493031 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 3 D0712 20:23:45.493042 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:45.498369 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.498446 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 4 D0712 20:23:45.498468 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:45.499503 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.499533 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 5 D0712 20:23:45.499544 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:45.499648 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.499668 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 6 D0712 20:23:45.499676 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:45.500060 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.500079 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 7 D0712 20:23:45.500087 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:45.500224 30210 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.500246 30210 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc001233050 8 D0712 20:23:45.500256 30210 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:45.500366 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.500396 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 9 D0712 20:23:45.500407 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:45.500430 30210 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.500437 30210 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc001233050 10 D0712 20:23:45.500444 30210 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:45.501548 30210 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.501573 30210 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc001233050 11 D0712 20:23:45.501583 30210 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:45.501738 30210 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.501762 30210 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc001233050 12 D0712 20:23:45.501772 30210 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:45.501805 30210 task_signals.go:470] [ 910: 910] Notified of signal 23 D0712 20:23:45.501883 30210 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0712 20:23:45.508009 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.508047 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 13 D0712 20:23:45.508060 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:45.512580 30210 task_signals.go:470] [ 910: 910] Notified of signal 23 D0712 20:23:45.512631 30210 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0712 20:23:45.518385 30210 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.518477 30210 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc001233050 14 D0712 20:23:45.518533 30210 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:45.518590 30210 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.518614 30210 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.518638 30210 task_signals.go:204] [ 910: 911] Signal 910, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.518672 30210 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.518681 30210 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.518688 30210 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.518704 30210 task_signals.go:204] [ 910: 912] Signal 910, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.518716 30210 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.518724 30210 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.518730 30210 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.518719 30210 task_signals.go:204] [ 910: 913] Signal 910, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.518740 30210 task_signals.go:204] [ 910: 914] Signal 910, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.518745 30210 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.518762 30210 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.518771 30210 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.518784 30210 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.520029 30210 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.520081 30210 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.520099 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.520125 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.520143 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.520162 30210 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.520927 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.522395 30210 syscalls.go:262] [ 915: 915] Allocating stack with size of 8388608 bytes D0712 20:23:45.522591 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.523481 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.523518 30210 usertrap_amd64.go:106] [ 915: 915] Map a usertrap vma at 6a000 D0712 20:23:45.523599 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 1 D0712 20:23:45.523625 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:45.524091 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.524115 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 2 D0712 20:23:45.524128 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:45.524802 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.524834 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 3 D0712 20:23:45.524847 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:45.533782 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.533821 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 4 D0712 20:23:45.533833 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:45.534901 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.534939 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 5 D0712 20:23:45.534951 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:45.535005 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.535017 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 6 D0712 20:23:45.535022 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:45.535205 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.535224 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 7 D0712 20:23:45.535230 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:45.535434 30210 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.535466 30210 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc0012331a0 8 D0712 20:23:45.535478 30210 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:45.535649 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.535672 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 9 D0712 20:23:45.535682 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:45.535692 30210 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.535698 30210 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc0012331a0 10 D0712 20:23:45.535707 30210 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:45.542775 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.542803 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 11 D0712 20:23:45.542812 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:45.546815 30210 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.546905 30210 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc0012331a0 12 D0712 20:23:45.546941 30210 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:45.546965 30210 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.546984 30210 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc0012331a0 13 D0712 20:23:45.546996 30210 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:45.547048 30210 task_signals.go:470] [ 915: 915] Notified of signal 23 D0712 20:23:45.547159 30210 task_signals.go:220] [ 915: 915] Signal 23: delivering to handler D0712 20:23:45.552863 30210 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.552906 30210 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc0012331a0 14 D0712 20:23:45.552923 30210 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.553016 30210 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.553066 30210 task_signals.go:204] [ 915: 918] Signal 915, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.553067 30210 task_signals.go:204] [ 915: 917] Signal 915, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.553106 30210 task_signals.go:204] [ 915: 919] Signal 915, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.553136 30210 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.553162 30210 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.553159 30210 task_signals.go:204] [ 915: 916] Signal 915, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.553179 30210 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.553185 30210 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.553197 30210 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.553218 30210 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.553224 30210 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.553232 30210 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.553255 30210 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.553258 30210 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.553263 30210 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.554503 30210 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.554559 30210 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.554585 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.555072 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.555098 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.555250 30210 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.555799 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.557342 30210 syscalls.go:262] [ 920: 920] Allocating stack with size of 8388608 bytes D0712 20:23:45.557442 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.558630 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.558665 30210 usertrap_amd64.go:106] [ 920: 920] Map a usertrap vma at 62000 D0712 20:23:45.558767 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 1 D0712 20:23:45.558837 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:45.559554 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.559578 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 2 D0712 20:23:45.559587 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:45.560119 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.560140 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 3 D0712 20:23:45.560147 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:45.565900 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.565968 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 4 D0712 20:23:45.565981 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:45.567234 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.567265 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 5 D0712 20:23:45.567276 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:45.567536 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.567551 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 6 D0712 20:23:45.567557 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:45.567828 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.567843 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 7 D0712 20:23:45.567847 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:45.567991 30210 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.568014 30210 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc001233770 8 D0712 20:23:45.568024 30210 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:45.568188 30210 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.568213 30210 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc001233770 9 D0712 20:23:45.568222 30210 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:45.568260 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.568268 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 10 D0712 20:23:45.568278 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:45.569071 30210 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.569103 30210 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc001233770 11 D0712 20:23:45.569115 30210 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:45.569158 30210 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.569182 30210 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc001233770 12 D0712 20:23:45.569193 30210 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:45.569272 30210 task_signals.go:470] [ 920: 920] Notified of signal 23 D0712 20:23:45.569354 30210 task_signals.go:220] [ 920: 920] Signal 23: delivering to handler D0712 20:23:45.579474 30210 task_signals.go:470] [ 920: 920] Notified of signal 23 D0712 20:23:45.579548 30210 task_signals.go:220] [ 920: 920] Signal 23: delivering to handler D0712 20:23:45.580398 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.580430 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 13 D0712 20:23:45.580444 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:45.589710 30210 task_signals.go:470] [ 920: 920] Notified of signal 23 D0712 20:23:45.590995 30210 task_signals.go:220] [ 920: 920] Signal 23: delivering to handler D0712 20:23:45.591683 30210 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.591713 30210 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc001233770 14 D0712 20:23:45.591727 30210 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:45.591772 30210 task_exit.go:204] [ 920: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.591792 30210 task_exit.go:204] [ 920: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.591817 30210 task_signals.go:204] [ 920: 921] Signal 920, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.591831 30210 task_exit.go:204] [ 920: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.591840 30210 task_exit.go:204] [ 920: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.591846 30210 task_exit.go:204] [ 920: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.591878 30210 task_signals.go:204] [ 920: 922] Signal 920, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.591921 30210 task_exit.go:204] [ 920: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.591898 30210 task_signals.go:204] [ 920: 924] Signal 920, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.591925 30210 task_signals.go:204] [ 920: 923] Signal 920, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.591899 30210 task_signals.go:204] [ 920: 925] Signal 920, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.591932 30210 task_exit.go:204] [ 920: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.591966 30210 task_exit.go:204] [ 920: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.592007 30210 task_exit.go:204] [ 920: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.592023 30210 task_exit.go:204] [ 920: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.592038 30210 task_exit.go:204] [ 920: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.592048 30210 task_exit.go:204] [ 920: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.592074 30210 task_exit.go:204] [ 920: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.592079 30210 task_exit.go:204] [ 920: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.592090 30210 task_exit.go:204] [ 920: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.594052 30210 task_exit.go:204] [ 920: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.594093 30210 task_exit.go:204] [ 920: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.594113 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.597098 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.597126 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.597224 30210 task_exit.go:204] [ 920: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.598269 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.599945 30210 syscalls.go:262] [ 926: 926] Allocating stack with size of 8388608 bytes D0712 20:23:45.600064 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.601023 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.601067 30210 usertrap_amd64.go:106] [ 926: 926] Map a usertrap vma at 68000 D0712 20:23:45.601151 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 1 D0712 20:23:45.601181 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.601997 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.602073 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 2 D0712 20:23:45.602099 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.602923 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.602944 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 3 D0712 20:23:45.602954 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.611644 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.611676 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 4 D0712 20:23:45.611701 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.613149 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.613183 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 5 D0712 20:23:45.613196 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.613270 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.613279 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 6 D0712 20:23:45.613287 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.613576 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.613604 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 7 D0712 20:23:45.613614 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.613805 30210 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.613826 30210 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001233b90 8 D0712 20:23:45.613837 30210 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.613927 30210 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.614380 30210 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001233b90 9 D0712 20:23:45.614436 30210 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.614518 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.614538 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 10 D0712 20:23:45.614557 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.625490 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.625505 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 11 D0712 20:23:45.625514 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.628082 30210 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.628138 30210 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001233b90 12 D0712 20:23:45.628159 30210 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.628201 30210 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.628223 30210 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001233b90 13 D0712 20:23:45.628237 30210 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.628320 30210 task_signals.go:470] [ 926: 926] Notified of signal 23 D0712 20:23:45.628430 30210 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0712 20:23:45.637069 30210 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.637103 30210 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001233b90 14 D0712 20:23:45.637127 30210 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.637207 30210 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.637238 30210 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.637272 30210 task_signals.go:204] [ 926: 931] Signal 926, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.637296 30210 task_signals.go:204] [ 926: 929] Signal 926, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.637302 30210 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.637276 30210 task_signals.go:204] [ 926: 927] Signal 926, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.637312 30210 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.637330 30210 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.637295 30210 task_signals.go:204] [ 926: 928] Signal 926, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.637344 30210 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.637280 30210 task_signals.go:204] [ 926: 930] Signal 926, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.637352 30210 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.637362 30210 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.637367 30210 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.637377 30210 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.637387 30210 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.637414 30210 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.637436 30210 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.637445 30210 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.637457 30210 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.638811 30210 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.638845 30210 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.638860 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.639041 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.639070 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.639122 30210 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.639984 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.642592 30210 syscalls.go:262] [ 932: 932] Allocating stack with size of 8388608 bytes D0712 20:23:45.642807 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.645176 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.645285 30210 usertrap_amd64.go:106] [ 932: 932] Map a usertrap vma at 64000 D0712 20:23:45.645480 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 1 D0712 20:23:45.645653 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:45.646358 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.646409 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 2 D0712 20:23:45.646432 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:45.647731 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.647787 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 3 D0712 20:23:45.647805 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:45.656667 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.656719 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 4 D0712 20:23:45.656737 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:45.658417 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.658468 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 5 D0712 20:23:45.658486 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:45.658557 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.658567 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 6 D0712 20:23:45.658585 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:45.659156 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.659189 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 7 D0712 20:23:45.659202 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:45.659666 30210 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.659712 30210 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0011a2ed0 8 D0712 20:23:45.659731 30210 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:45.660107 30210 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.660143 30210 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0011a2ed0 9 D0712 20:23:45.660160 30210 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:45.660210 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.660232 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 10 D0712 20:23:45.660256 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:45.661030 30210 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.661074 30210 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0011a2ed0 11 D0712 20:23:45.661094 30210 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:45.661204 30210 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.661240 30210 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0011a2ed0 12 D0712 20:23:45.661277 30210 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:45.661308 30210 task_signals.go:470] [ 932: 932] Notified of signal 23 D0712 20:23:45.662277 30210 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0712 20:23:45.670242 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.670280 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 13 D0712 20:23:45.670324 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:45.674149 30210 task_signals.go:470] [ 932: 932] Notified of signal 23 D0712 20:23:45.674272 30210 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0712 20:23:45.681319 30210 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.681362 30210 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0011a2ed0 14 D0712 20:23:45.681380 30210 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:45.681479 30210 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.681516 30210 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.681565 30210 task_signals.go:204] [ 932: 934] Signal 932, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.681599 30210 task_signals.go:204] [ 932: 935] Signal 932, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.681588 30210 task_signals.go:204] [ 932: 933] Signal 932, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.681622 30210 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.681572 30210 task_signals.go:204] [ 932: 936] Signal 932, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.681635 30210 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.681651 30210 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.681689 30210 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.681702 30210 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.681708 30210 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.681720 30210 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.681737 30210 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.681743 30210 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.681752 30210 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.686855 30210 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.686989 30210 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.687018 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.687109 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.687123 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.687252 30210 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.688796 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.690611 30210 syscalls.go:262] [ 937: 937] Allocating stack with size of 8388608 bytes D0712 20:23:45.690854 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.693283 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.693313 30210 usertrap_amd64.go:106] [ 937: 937] Map a usertrap vma at 69000 D0712 20:23:45.693415 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 1 D0712 20:23:45.693459 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.693739 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.693797 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 2 D0712 20:23:45.693808 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.694530 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.694551 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 3 D0712 20:23:45.694560 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.701696 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.701724 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 4 D0712 20:23:45.701736 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.702933 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.702955 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 5 D0712 20:23:45.702965 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.703003 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.703022 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 6 D0712 20:23:45.703031 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.703244 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.703257 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 7 D0712 20:23:45.703269 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.703403 30210 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.703426 30210 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001f699e0 8 D0712 20:23:45.703435 30210 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.703618 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.703659 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 9 D0712 20:23:45.703669 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.703722 30210 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.703739 30210 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001f699e0 10 D0712 20:23:45.703751 30210 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.712443 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.712491 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 11 D0712 20:23:45.712508 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.717190 30210 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.717229 30210 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001f699e0 12 D0712 20:23:45.717247 30210 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.717346 30210 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.717364 30210 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001f699e0 13 D0712 20:23:45.717376 30210 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.717448 30210 task_signals.go:470] [ 937: 937] Notified of signal 23 D0712 20:23:45.717534 30210 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0712 20:23:45.723581 30210 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.723623 30210 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001f699e0 14 D0712 20:23:45.723641 30210 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.723719 30210 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.723763 30210 task_signals.go:204] [ 937: 938] Signal 937, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.723788 30210 task_signals.go:204] [ 937: 941] Signal 937, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.723800 30210 task_signals.go:204] [ 937: 940] Signal 937, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.723817 30210 task_signals.go:204] [ 937: 939] Signal 937, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.723825 30210 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.723843 30210 task_signals.go:204] [ 937: 942] Signal 937, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.723852 30210 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.723859 30210 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.723866 30210 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.723895 30210 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.723949 30210 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.723956 30210 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.723966 30210 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.723973 30210 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.723979 30210 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.723989 30210 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.723997 30210 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.724003 30210 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.724013 30210 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.725424 30210 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.725447 30210 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.725462 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.725507 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.725533 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.725702 30210 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.726344 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.728007 30210 syscalls.go:262] [ 943: 943] Allocating stack with size of 8388608 bytes D0712 20:23:45.728268 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.730768 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.730795 30210 usertrap_amd64.go:106] [ 943: 943] Map a usertrap vma at 66000 D0712 20:23:45.730866 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 1 D0712 20:23:45.730896 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:45.731261 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.731283 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 2 D0712 20:23:45.731293 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:45.732410 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.732437 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 3 D0712 20:23:45.732448 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:45.738533 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.738558 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 4 D0712 20:23:45.738569 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:45.739726 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.739754 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 5 D0712 20:23:45.739790 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:45.739846 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.739857 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 6 D0712 20:23:45.739866 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:45.740069 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.740093 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 7 D0712 20:23:45.740103 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:45.740253 30210 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.740274 30210 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc000a06030 8 D0712 20:23:45.740285 30210 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:45.740500 30210 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.740572 30210 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc000a06030 9 D0712 20:23:45.740596 30210 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:45.740637 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.740642 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 10 D0712 20:23:45.740654 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:45.750180 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.750255 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 11 D0712 20:23:45.750272 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:45.753004 30210 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.753037 30210 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc000a06030 12 D0712 20:23:45.753050 30210 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:45.753139 30210 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.753157 30210 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc000a06030 13 D0712 20:23:45.753166 30210 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:45.753235 30210 task_signals.go:470] [ 943: 943] Notified of signal 23 D0712 20:23:45.753315 30210 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler I0712 20:23:45.762149 30210 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0712 20:23:45.762241 30210 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.762257 30210 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc000a06030 14 D0712 20:23:45.762270 30210 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:45.762354 30210 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.762387 30210 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.762413 30210 task_signals.go:204] [ 943: 945] Signal 943, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.762460 30210 task_signals.go:204] [ 943: 947] Signal 943, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.762479 30210 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.762407 30210 task_signals.go:204] [ 943: 944] Signal 943, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.762494 30210 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.762524 30210 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.762550 30210 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.762572 30210 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.762599 30210 task_signals.go:204] [ 943: 946] Signal 943, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.762615 30210 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.762621 30210 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.762631 30210 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.762639 30210 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.762649 30210 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.764575 30210 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.764611 30210 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.764658 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.764803 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.764872 30210 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.765062 30210 task_signals.go:470] [ 7: 12] Notified of signal 23 D0712 20:23:45.765220 30210 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0712 20:23:45.765919 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.767800 30210 syscalls.go:262] [ 948: 948] Allocating stack with size of 8388608 bytes D0712 20:23:45.767944 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.770115 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.770192 30210 usertrap_amd64.go:106] [ 948: 948] Map a usertrap vma at 66000 D0712 20:23:45.770317 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 1 D0712 20:23:45.770365 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:45.770944 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.771091 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 2 D0712 20:23:45.771145 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:45.772628 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.772721 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 3 D0712 20:23:45.772772 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:45.780853 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.781061 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 4 D0712 20:23:45.781111 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:45.782610 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.782697 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 5 D0712 20:23:45.782763 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:45.782851 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.782876 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 6 D0712 20:23:45.782886 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:45.783277 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.783322 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 7 D0712 20:23:45.783334 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:45.783602 30210 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.783646 30210 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc000a06150 8 D0712 20:23:45.783665 30210 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:45.783976 30210 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.784031 30210 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc000a06150 9 D0712 20:23:45.784048 30210 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:45.784237 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.784266 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 10 D0712 20:23:45.784279 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:45.784325 30210 usertrap_amd64.go:212] [ 948: 951] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.784372 30210 usertrap_amd64.go:122] [ 948: 951] Allocate a new trap: 0xc000a06150 11 D0712 20:23:45.784413 30210 usertrap_amd64.go:225] [ 948: 951] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:45.792308 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.792381 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 12 D0712 20:23:45.792418 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:45.795292 30210 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.795333 30210 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc000a06150 13 D0712 20:23:45.795544 30210 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:45.795670 30210 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.795684 30210 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc000a06150 14 D0712 20:23:45.795694 30210 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:45.795740 30210 task_signals.go:470] [ 948: 948] Notified of signal 23 D0712 20:23:45.795827 30210 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0712 20:23:45.803326 30210 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.803368 30210 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc000a06150 15 D0712 20:23:45.803382 30210 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 20:23:45.803453 30210 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.803492 30210 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.803521 30210 task_signals.go:204] [ 948: 951] Signal 948, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.803516 30210 task_signals.go:204] [ 948: 950] Signal 948, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.803534 30210 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.803537 30210 task_signals.go:204] [ 948: 949] Signal 948, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.803563 30210 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.803590 30210 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.803599 30210 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.803617 30210 task_signals.go:204] [ 948: 952] Signal 948, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.803641 30210 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.803651 30210 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.803676 30210 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.803689 30210 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.803696 30210 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.803709 30210 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.805141 30210 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.805178 30210 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.805193 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.805221 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.805230 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.805313 30210 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.812488 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.813898 30210 syscalls.go:262] [ 953: 953] Allocating stack with size of 8388608 bytes D0712 20:23:45.814009 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.816990 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.817039 30210 usertrap_amd64.go:106] [ 953: 953] Map a usertrap vma at 62000 D0712 20:23:45.817166 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 1 D0712 20:23:45.817197 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:45.817609 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.817680 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 2 D0712 20:23:45.817699 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:45.818304 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.818332 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 3 D0712 20:23:45.818343 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:45.824049 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.824086 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 4 D0712 20:23:45.824097 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:45.825861 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.825887 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 5 D0712 20:23:45.825897 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:45.825943 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.825948 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 6 D0712 20:23:45.825953 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:45.826234 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.826249 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 7 D0712 20:23:45.826255 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:45.826388 30210 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.826419 30210 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0011a3c50 8 D0712 20:23:45.826430 30210 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:45.826546 30210 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.826572 30210 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0011a3c50 9 D0712 20:23:45.826586 30210 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:45.826712 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.826736 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 10 D0712 20:23:45.826747 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:45.827293 30210 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.827318 30210 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0011a3c50 11 D0712 20:23:45.827331 30210 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:45.827413 30210 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.827435 30210 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0011a3c50 12 D0712 20:23:45.827446 30210 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:45.827478 30210 task_signals.go:470] [ 953: 953] Notified of signal 23 D0712 20:23:45.828631 30210 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler D0712 20:23:45.836045 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.836078 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 13 D0712 20:23:45.836090 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:45.838934 30210 task_signals.go:470] [ 953: 953] Notified of signal 23 D0712 20:23:45.839004 30210 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler I0712 20:23:45.846610 30210 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0712 20:23:45.846695 30210 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.846710 30210 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0011a3c50 14 D0712 20:23:45.846724 30210 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:45.846824 30210 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.846861 30210 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.846890 30210 task_signals.go:204] [ 953: 957] Signal 953, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.846906 30210 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.846913 30210 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.846920 30210 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.846893 30210 task_signals.go:204] [ 953: 955] Signal 953, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.846951 30210 task_signals.go:204] [ 953: 956] Signal 953, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.846959 30210 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.846994 30210 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.847002 30210 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.846937 30210 task_signals.go:204] [ 953: 954] Signal 953, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.847040 30210 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.847051 30210 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.847058 30210 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.847073 30210 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.848201 30210 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.848238 30210 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.848252 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.848319 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.848347 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.848468 30210 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.849004 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.850273 30210 syscalls.go:262] [ 958: 958] Allocating stack with size of 8388608 bytes D0712 20:23:45.850609 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.851941 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.851984 30210 usertrap_amd64.go:106] [ 958: 958] Map a usertrap vma at 62000 D0712 20:23:45.852107 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 1 D0712 20:23:45.852137 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:45.852685 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.852714 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 2 D0712 20:23:45.852722 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:45.853408 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.853436 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 3 D0712 20:23:45.853445 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:45.859624 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.859652 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 4 D0712 20:23:45.859664 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:45.860864 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.860889 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 5 D0712 20:23:45.860898 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:45.861011 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.861031 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 6 D0712 20:23:45.861039 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:45.861265 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.861283 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 7 D0712 20:23:45.861291 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:45.861444 30210 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.861466 30210 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc0013bfb30 8 D0712 20:23:45.861472 30210 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:45.861637 30210 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.861665 30210 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc0013bfb30 9 D0712 20:23:45.861786 30210 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b6e0 trap addr 622d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:45.861833 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.861857 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 10 D0712 20:23:45.861871 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:45.861958 30210 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.861988 30210 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc0013bfb30 11 D0712 20:23:45.862001 30210 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46af76 trap addr 62370 ([184 35 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:45.862270 30210 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.862299 30210 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc0013bfb30 12 D0712 20:23:45.862311 30210 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:45.862344 30210 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.862356 30210 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc0013bfb30 13 D0712 20:23:45.862366 30210 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:45.862386 30210 task_signals.go:470] [ 958: 958] Notified of signal 23 D0712 20:23:45.862483 30210 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler D0712 20:23:45.868484 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.868512 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 14 D0712 20:23:45.868525 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:45.873734 30210 task_signals.go:470] [ 958: 958] Notified of signal 23 D0712 20:23:45.874375 30210 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler D0712 20:23:45.874486 30210 task_signals.go:470] [ 958: 958] Notified of signal 23 D0712 20:23:45.874543 30210 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler I0712 20:23:45.878399 30210 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0712 20:23:45.878492 30210 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.878509 30210 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc0013bfb30 15 D0712 20:23:45.878526 30210 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 20:23:45.878657 30210 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.878694 30210 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.878717 30210 task_signals.go:204] [ 958: 959] Signal 958, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.878729 30210 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.878736 30210 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.878741 30210 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.878760 30210 task_signals.go:204] [ 958: 962] Signal 958, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.878877 30210 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.878780 30210 task_signals.go:204] [ 958: 961] Signal 958, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.878809 30210 task_signals.go:204] [ 958: 960] Signal 958, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.878902 30210 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.878928 30210 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.879000 30210 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.879062 30210 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.879071 30210 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.879090 30210 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.880213 30210 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.880248 30210 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.880263 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.880338 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.880349 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.880484 30210 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.881386 30210 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.882845 30210 syscalls.go:262] [ 963: 963] Allocating stack with size of 8388608 bytes D0712 20:23:45.883026 30210 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.884209 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.884250 30210 usertrap_amd64.go:106] [ 963: 963] Map a usertrap vma at 65000 D0712 20:23:45.884332 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 1 D0712 20:23:45.884376 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:45.884698 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.884736 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 2 D0712 20:23:45.884750 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:45.885564 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.885581 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 3 D0712 20:23:45.885593 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:45.891828 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.891862 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 4 D0712 20:23:45.891875 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:45.893502 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.893555 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 5 D0712 20:23:45.893576 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:45.893641 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.893650 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 6 D0712 20:23:45.893657 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:45.893989 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.894012 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 7 D0712 20:23:45.894021 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:45.894210 30210 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.894236 30210 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001b98750 8 D0712 20:23:45.894247 30210 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:45.894459 30210 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.894484 30210 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001b98750 9 D0712 20:23:45.894494 30210 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:45.894656 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.894687 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 10 D0712 20:23:45.894699 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:45.902942 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.902981 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 11 D0712 20:23:45.902994 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:45.905712 30210 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.905767 30210 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001b98750 12 D0712 20:23:45.905809 30210 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:45.905855 30210 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.905867 30210 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001b98750 13 D0712 20:23:45.905873 30210 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:45.905889 30210 task_signals.go:470] [ 963: 963] Notified of signal 23 D0712 20:23:45.905954 30210 task_signals.go:220] [ 963: 963] Signal 23: delivering to handler I0712 20:23:45.913051 30210 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0712 20:23:45.913153 30210 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.913164 30210 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001b98750 14 D0712 20:23:45.913181 30210 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:45.913237 30210 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.913276 30210 task_signals.go:204] [ 963: 965] Signal 963, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.913289 30210 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.913319 30210 task_signals.go:204] [ 963: 964] Signal 963, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.913332 30210 task_signals.go:204] [ 963: 966] Signal 963, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.913343 30210 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.913359 30210 task_signals.go:204] [ 963: 967] Signal 963, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.913371 30210 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.913386 30210 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.913399 30210 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.913407 30210 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.913413 30210 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.913422 30210 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.913430 30210 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.913456 30210 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.913469 30210 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.914592 30210 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.914617 30210 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.914629 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.914667 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.914781 30210 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.915618 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.916991 30210 syscalls.go:262] [ 968: 968] Allocating stack with size of 8388608 bytes D0712 20:23:45.917215 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.918688 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.918738 30210 usertrap_amd64.go:106] [ 968: 968] Map a usertrap vma at 69000 D0712 20:23:45.918922 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 1 D0712 20:23:45.918963 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.919390 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.919423 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 2 D0712 20:23:45.919436 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.920317 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.920352 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 3 D0712 20:23:45.920365 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.926077 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.926109 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 4 D0712 20:23:45.926121 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.927212 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.927235 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 5 D0712 20:23:45.927243 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.927297 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.927313 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 6 D0712 20:23:45.927321 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.927510 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.927534 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 7 D0712 20:23:45.927543 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.927693 30210 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.927713 30210 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a06810 8 D0712 20:23:45.927723 30210 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.927956 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.927979 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 9 D0712 20:23:45.927990 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.928045 30210 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.928066 30210 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a06810 10 D0712 20:23:45.928075 30210 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.928222 30210 usertrap_amd64.go:212] [ 968: 971] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.928250 30210 usertrap_amd64.go:122] [ 968: 971] Allocate a new trap: 0xc000a06810 11 D0712 20:23:45.928261 30210 usertrap_amd64.go:225] [ 968: 971] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.934685 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.934715 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 12 D0712 20:23:45.934729 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.938348 30210 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.938381 30210 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a06810 13 D0712 20:23:45.938393 30210 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.938440 30210 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.938466 30210 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a06810 14 D0712 20:23:45.938474 30210 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.938498 30210 task_signals.go:470] [ 968: 968] Notified of signal 23 D0712 20:23:45.938541 30210 task_signals.go:220] [ 968: 968] Signal 23: delivering to handler I0712 20:23:45.944174 30210 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0712 20:23:45.944277 30210 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.944293 30210 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a06810 15 D0712 20:23:45.944304 30210 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 20:23:45.944357 30210 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.944391 30210 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.944420 30210 task_signals.go:204] [ 968: 972] Signal 968, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.944438 30210 task_signals.go:204] [ 968: 970] Signal 968, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.944435 30210 task_signals.go:204] [ 968: 971] Signal 968, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.944461 30210 task_signals.go:204] [ 968: 969] Signal 968, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.944484 30210 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.944502 30210 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.944509 30210 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.944523 30210 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.944536 30210 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.944540 30210 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.944547 30210 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.944564 30210 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.944586 30210 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.944602 30210 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.945905 30210 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.945934 30210 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.945947 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.946001 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.946026 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.946211 30210 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.947010 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.948869 30210 syscalls.go:262] [ 973: 973] Allocating stack with size of 8388608 bytes D0712 20:23:45.949067 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.950365 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.950413 30210 usertrap_amd64.go:106] [ 973: 973] Map a usertrap vma at 63000 D0712 20:23:45.950516 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 1 D0712 20:23:45.950555 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:45.951417 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.951464 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 2 D0712 20:23:45.951481 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:45.952082 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.952112 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 3 D0712 20:23:45.952123 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:45.958486 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.958557 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 4 D0712 20:23:45.958573 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:45.961641 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.961685 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 5 D0712 20:23:45.961701 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:45.961801 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.961824 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 6 D0712 20:23:45.961833 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:45.962222 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.962250 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 7 D0712 20:23:45.962261 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:45.962465 30210 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.962491 30210 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc0008aac00 8 D0712 20:23:45.962504 30210 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:45.962817 30210 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.962855 30210 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc0008aac00 9 D0712 20:23:45.962871 30210 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:45.962990 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.963013 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 10 D0712 20:23:45.963024 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:45.971289 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.971335 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 11 D0712 20:23:45.971352 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:45.975330 30210 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.975369 30210 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc0008aac00 12 D0712 20:23:45.975385 30210 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:45.975438 30210 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.975459 30210 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc0008aac00 13 D0712 20:23:45.975470 30210 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:45.975532 30210 task_signals.go:470] [ 973: 973] Notified of signal 23 D0712 20:23:45.975624 30210 task_signals.go:220] [ 973: 973] Signal 23: delivering to handler D0712 20:23:45.987160 30210 task_signals.go:470] [ 973: 973] Notified of signal 23 D0712 20:23:45.987288 30210 task_signals.go:220] [ 973: 973] Signal 23: delivering to handler D0712 20:23:45.988697 30210 task_signals.go:470] [ 973: 973] Notified of signal 23 D0712 20:23:45.989246 30210 task_signals.go:220] [ 973: 973] Signal 23: delivering to handler I0712 20:23:45.989739 30210 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0712 20:23:45.989824 30210 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.989851 30210 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc0008aac00 14 D0712 20:23:45.989867 30210 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:45.989927 30210 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.989965 30210 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.989990 30210 task_signals.go:204] [ 973: 975] Signal 973, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.989992 30210 task_signals.go:204] [ 973: 976] Signal 973, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.990007 30210 task_signals.go:204] [ 973: 974] Signal 973, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.990013 30210 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.990024 30210 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.990035 30210 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.990014 30210 task_signals.go:204] [ 973: 977] Signal 973, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.990062 30210 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.990100 30210 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.990210 30210 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.990272 30210 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.990330 30210 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.990341 30210 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.990352 30210 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.991698 30210 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.991730 30210 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.991746 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.994590 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:45.994621 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.994778 30210 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.995508 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.997017 30210 syscalls.go:262] [ 978: 978] Allocating stack with size of 8388608 bytes D0712 20:23:45.997126 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.001617 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.001655 30210 usertrap_amd64.go:106] [ 978: 978] Map a usertrap vma at 65000 D0712 20:23:46.001762 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 1 D0712 20:23:46.001798 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:46.002481 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.002495 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 2 D0712 20:23:46.002503 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:46.003050 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.003079 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 3 D0712 20:23:46.003085 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:46.009625 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.009654 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 4 D0712 20:23:46.009667 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:46.011123 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.011187 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 5 D0712 20:23:46.011210 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:46.011295 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.011324 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 6 D0712 20:23:46.011332 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:46.011793 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.011818 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 7 D0712 20:23:46.011828 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:46.012058 30210 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.012080 30210 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc001b98f90 8 D0712 20:23:46.012092 30210 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:46.012228 30210 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.012290 30210 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc001b98f90 9 D0712 20:23:46.012360 30210 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:46.012532 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.012608 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 10 D0712 20:23:46.013015 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:46.021093 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.021124 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 11 D0712 20:23:46.021133 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:46.023737 30210 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.023800 30210 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc001b98f90 12 D0712 20:23:46.023822 30210 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:46.024700 30210 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.024728 30210 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc001b98f90 13 D0712 20:23:46.024740 30210 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:46.024821 30210 task_signals.go:470] [ 978: 978] Notified of signal 23 D0712 20:23:46.024922 30210 task_signals.go:220] [ 978: 978] Signal 23: delivering to handler I0712 20:23:46.031747 30210 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0712 20:23:46.031825 30210 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.031833 30210 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc001b98f90 14 D0712 20:23:46.031841 30210 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:46.031875 30210 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.031953 30210 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.031983 30210 task_signals.go:204] [ 978: 980] Signal 978, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.032004 30210 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.032013 30210 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.032020 30210 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.032035 30210 task_signals.go:204] [ 978: 979] Signal 978, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.032049 30210 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.032057 30210 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.032063 30210 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.032075 30210 task_signals.go:204] [ 978: 981] Signal 978, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.032110 30210 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.032115 30210 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.032119 30210 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.032127 30210 task_signals.go:204] [ 978: 982] Signal 978, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.032134 30210 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.033212 30210 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.033229 30210 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.033241 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.033318 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.033334 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.034037 30210 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.034771 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.036255 30210 syscalls.go:262] [ 983: 983] Allocating stack with size of 8388608 bytes D0712 20:23:46.036419 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.038358 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.038389 30210 usertrap_amd64.go:106] [ 983: 983] Map a usertrap vma at 60000 D0712 20:23:46.038442 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 1 D0712 20:23:46.038463 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:46.038696 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.038716 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 2 D0712 20:23:46.038724 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:46.039197 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.039219 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 3 D0712 20:23:46.039229 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:46.044417 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.044445 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 4 D0712 20:23:46.044456 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:46.045752 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.045778 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 5 D0712 20:23:46.045793 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:46.045842 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.045858 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 6 D0712 20:23:46.045866 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:46.046398 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.046424 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 7 D0712 20:23:46.046434 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:46.046566 30210 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.046586 30210 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc001ec4fc0 8 D0712 20:23:46.046596 30210 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:46.046942 30210 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.046969 30210 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc001ec4fc0 9 D0712 20:23:46.046979 30210 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b6e0 trap addr 602d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:46.047002 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.047009 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 10 D0712 20:23:46.047016 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:46.047139 30210 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.047160 30210 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc001ec4fc0 11 D0712 20:23:46.047168 30210 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46af76 trap addr 60370 ([184 35 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:46.054154 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.054175 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 12 D0712 20:23:46.054185 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:46.058023 30210 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.058052 30210 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc001ec4fc0 13 D0712 20:23:46.058067 30210 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:46.058109 30210 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.058117 30210 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc001ec4fc0 14 D0712 20:23:46.058125 30210 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:46.058154 30210 task_signals.go:470] [ 983: 983] Notified of signal 23 D0712 20:23:46.058233 30210 task_signals.go:220] [ 983: 983] Signal 23: delivering to handler D0712 20:23:46.064037 30210 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.064064 30210 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc001ec4fc0 15 D0712 20:23:46.064073 30210 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 20:23:46.064109 30210 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.064128 30210 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.064130 30210 task_signals.go:204] [ 983: 984] Signal 983, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.064147 30210 task_signals.go:204] [ 983: 985] Signal 983, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.064148 30210 task_signals.go:204] [ 983: 987] Signal 983, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.064159 30210 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.064172 30210 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.064179 30210 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.064195 30210 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.064204 30210 task_signals.go:204] [ 983: 986] Signal 983, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.064224 30210 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.064238 30210 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.064251 30210 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.064258 30210 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.064271 30210 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.064298 30210 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.065787 30210 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.065812 30210 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.065821 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.065875 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.065902 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.066037 30210 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.066848 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.068345 30210 syscalls.go:262] [ 988: 988] Allocating stack with size of 8388608 bytes D0712 20:23:46.068435 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.070388 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.070459 30210 usertrap_amd64.go:106] [ 988: 988] Map a usertrap vma at 68000 D0712 20:23:46.070589 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 1 D0712 20:23:46.070632 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:46.070953 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.070978 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 2 D0712 20:23:46.070990 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:46.071698 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.071726 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 3 D0712 20:23:46.071738 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:46.077563 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.077606 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 4 D0712 20:23:46.077623 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:46.078752 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.078785 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 5 D0712 20:23:46.078796 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:46.078829 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.078834 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 6 D0712 20:23:46.078839 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:46.079122 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.079143 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 7 D0712 20:23:46.079149 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:46.079217 30210 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.079230 30210 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc000a07140 8 D0712 20:23:46.079240 30210 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:46.079388 30210 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.080245 30210 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc000a07140 9 D0712 20:23:46.080271 30210 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:46.080311 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.080323 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 10 D0712 20:23:46.080332 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:46.080794 30210 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.080836 30210 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc000a07140 11 D0712 20:23:46.080936 30210 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:46.081056 30210 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.081073 30210 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc000a07140 12 D0712 20:23:46.081097 30210 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:46.081156 30210 task_signals.go:470] [ 988: 988] Notified of signal 23 D0712 20:23:46.081217 30210 task_signals.go:220] [ 988: 988] Signal 23: delivering to handler D0712 20:23:46.087789 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.087822 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 13 D0712 20:23:46.087835 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:46.091567 30210 task_signals.go:470] [ 988: 988] Notified of signal 23 D0712 20:23:46.091638 30210 task_signals.go:220] [ 988: 988] Signal 23: delivering to handler D0712 20:23:46.098191 30210 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.098235 30210 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc000a07140 14 D0712 20:23:46.098250 30210 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:46.098329 30210 task_exit.go:204] [ 988: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.098353 30210 task_exit.go:204] [ 988: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.098378 30210 task_signals.go:204] [ 988: 990] Signal 988, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.098426 30210 task_exit.go:204] [ 988: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.098452 30210 task_exit.go:204] [ 988: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.098460 30210 task_exit.go:204] [ 988: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.098389 30210 task_signals.go:204] [ 988: 991] Signal 988, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.098515 30210 task_exit.go:204] [ 988: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.098525 30210 task_exit.go:204] [ 988: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.098531 30210 task_exit.go:204] [ 988: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.098408 30210 task_signals.go:204] [ 988: 989] Signal 988, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.098547 30210 task_exit.go:204] [ 988: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.098554 30210 task_exit.go:204] [ 988: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.098560 30210 task_exit.go:204] [ 988: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.098423 30210 task_signals.go:204] [ 988: 992] Signal 988, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.098584 30210 task_exit.go:204] [ 988: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.099744 30210 task_exit.go:204] [ 988: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.099790 30210 task_exit.go:204] [ 988: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.099809 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.099836 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.099846 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.099934 30210 task_exit.go:204] [ 988: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.101032 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.102706 30210 syscalls.go:262] [ 993: 993] Allocating stack with size of 8388608 bytes D0712 20:23:46.102828 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.103970 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.104005 30210 usertrap_amd64.go:106] [ 993: 993] Map a usertrap vma at 69000 D0712 20:23:46.104093 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 1 D0712 20:23:46.104115 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.104542 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.104606 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 2 D0712 20:23:46.104619 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.105287 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.105310 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 3 D0712 20:23:46.105316 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.112816 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.112850 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 4 D0712 20:23:46.112860 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.114131 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.114159 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 5 D0712 20:23:46.114167 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.114235 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.114290 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 6 D0712 20:23:46.114310 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.114787 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.114818 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 7 D0712 20:23:46.114827 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.115455 30210 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.115491 30210 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ab470 8 D0712 20:23:46.115506 30210 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.115801 30210 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.116032 30210 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ab470 9 D0712 20:23:46.116070 30210 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.116132 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.116184 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 10 D0712 20:23:46.116231 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.125176 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.125216 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 11 D0712 20:23:46.125228 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.127592 30210 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.127618 30210 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ab470 12 D0712 20:23:46.127629 30210 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.127685 30210 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.127690 30210 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ab470 13 D0712 20:23:46.127695 30210 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.127710 30210 task_signals.go:470] [ 993: 993] Notified of signal 23 D0712 20:23:46.128145 30210 task_signals.go:220] [ 993: 993] Signal 23: delivering to handler D0712 20:23:46.138295 30210 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.138329 30210 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ab470 14 D0712 20:23:46.138341 30210 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.138423 30210 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.138445 30210 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.138484 30210 task_signals.go:204] [ 993: 996] Signal 993, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.138528 30210 task_signals.go:204] [ 993: 995] Signal 993, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.138504 30210 task_signals.go:204] [ 993: 994] Signal 993, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.138543 30210 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.138517 30210 task_signals.go:204] [ 993: 997] Signal 993, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.138578 30210 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.138600 30210 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.138617 30210 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.138627 30210 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.138633 30210 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.138643 30210 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.138670 30210 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.138677 30210 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.138690 30210 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.139869 30210 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.139913 30210 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.139932 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.139979 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.140010 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.140061 30210 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitZombie to TaskExitDead I0712 20:23:46.140207 30210 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0712 20:23:46.141363 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.142909 30210 syscalls.go:262] [ 998: 998] Allocating stack with size of 8388608 bytes D0712 20:23:46.143000 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.146234 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.146271 30210 usertrap_amd64.go:106] [ 998: 998] Map a usertrap vma at 66000 D0712 20:23:46.146420 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 1 D0712 20:23:46.146475 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:46.146880 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.146904 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 2 D0712 20:23:46.146916 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:46.147500 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.147545 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 3 D0712 20:23:46.147560 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:46.155498 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.155560 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 4 D0712 20:23:46.155580 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:46.156585 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.156618 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 5 D0712 20:23:46.156633 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:46.156695 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.156703 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 6 D0712 20:23:46.156710 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:46.157095 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.157117 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 7 D0712 20:23:46.157135 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:46.158130 30210 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.158164 30210 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0019736e0 8 D0712 20:23:46.158178 30210 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:46.158491 30210 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.158506 30210 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0019736e0 9 D0712 20:23:46.158570 30210 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:46.158586 30210 usertrap_amd64.go:212] [ 998: 1001] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.158593 30210 usertrap_amd64.go:122] [ 998: 1001] Allocate a new trap: 0xc0019736e0 10 D0712 20:23:46.158600 30210 usertrap_amd64.go:225] [ 998: 1001] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:46.166590 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.166629 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 11 D0712 20:23:46.166644 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:46.168800 30210 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.168831 30210 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0019736e0 12 D0712 20:23:46.168843 30210 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:46.168906 30210 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.168927 30210 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0019736e0 13 D0712 20:23:46.168936 30210 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:46.169005 30210 task_signals.go:470] [ 998: 998] Notified of signal 23 D0712 20:23:46.169097 30210 task_signals.go:220] [ 998: 998] Signal 23: delivering to handler I0712 20:23:46.175983 30210 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0712 20:23:46.176058 30210 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.176069 30210 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0019736e0 14 D0712 20:23:46.176079 30210 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:46.176109 30210 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.176174 30210 task_signals.go:204] [ 998: 1001] Signal 998, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.176178 30210 task_signals.go:204] [ 998: 1000] Signal 998, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.176197 30210 task_signals.go:204] [ 998: 1002] Signal 998, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.176212 30210 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.176225 30210 task_signals.go:204] [ 998: 999] Signal 998, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.176245 30210 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.176253 30210 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.176259 30210 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.176279 30210 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.176310 30210 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.176316 30210 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.176348 30210 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.176355 30210 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.176366 30210 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.176377 30210 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.177383 30210 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.177404 30210 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.177420 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.177487 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.177509 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.177607 30210 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.178128 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.179264 30210 syscalls.go:262] [ 1003: 1003] Allocating stack with size of 8388608 bytes D0712 20:23:46.179350 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.180256 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.180295 30210 usertrap_amd64.go:106] [ 1003: 1003] Map a usertrap vma at 61000 D0712 20:23:46.180722 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 1 D0712 20:23:46.180760 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:46.181067 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.181089 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 2 D0712 20:23:46.181133 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:46.181821 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.181851 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 3 D0712 20:23:46.181862 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:46.191076 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.191112 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 4 D0712 20:23:46.191127 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:46.192545 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.192594 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 5 D0712 20:23:46.192609 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:46.192744 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.192771 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 6 D0712 20:23:46.192807 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:46.193257 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.193284 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 7 D0712 20:23:46.193297 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:46.193470 30210 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.193649 30210 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc001b99ad0 8 D0712 20:23:46.193674 30210 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:46.194133 30210 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.194150 30210 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc001b99ad0 9 D0712 20:23:46.194163 30210 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:46.194315 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.194401 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 10 D0712 20:23:46.194537 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:46.202030 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.202060 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 11 D0712 20:23:46.202070 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:46.204817 30210 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.204835 30210 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc001b99ad0 12 D0712 20:23:46.204848 30210 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:46.205014 30210 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.205081 30210 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc001b99ad0 13 D0712 20:23:46.205097 30210 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:46.205146 30210 task_signals.go:470] [ 1003: 1003] Notified of signal 23 D0712 20:23:46.205227 30210 task_signals.go:220] [ 1003: 1003] Signal 23: delivering to handler I0712 20:23:46.213642 30210 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0712 20:23:46.213715 30210 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.213726 30210 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc001b99ad0 14 D0712 20:23:46.213735 30210 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:46.213766 30210 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.213793 30210 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.213814 30210 task_signals.go:204] [ 1003: 1006] Signal 1003, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.213832 30210 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.213842 30210 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.213814 30210 task_signals.go:204] [ 1003: 1005] Signal 1003, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.213845 30210 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.213925 30210 task_signals.go:204] [ 1003: 1004] Signal 1003, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.213929 30210 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.213963 30210 task_signals.go:204] [ 1003: 1007] Signal 1003, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.213984 30210 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.213999 30210 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.214006 30210 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.214027 30210 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.214141 30210 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.214175 30210 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.215407 30210 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.215452 30210 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.215470 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.215510 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.215532 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.215690 30210 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.216350 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.218068 30210 syscalls.go:262] [ 1008: 1008] Allocating stack with size of 8388608 bytes D0712 20:23:46.218396 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.220003 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.220047 30210 usertrap_amd64.go:106] [ 1008: 1008] Map a usertrap vma at 66000 D0712 20:23:46.220133 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 1 D0712 20:23:46.220178 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:46.220574 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.220601 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 2 D0712 20:23:46.220614 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:46.221255 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.221279 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 3 D0712 20:23:46.221288 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:46.226572 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.226598 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 4 D0712 20:23:46.226608 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:46.227839 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.227867 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 5 D0712 20:23:46.227879 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:46.227935 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.227988 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 6 D0712 20:23:46.227998 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:46.228244 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.228271 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 7 D0712 20:23:46.228281 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:46.228506 30210 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.228539 30210 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc001ec5230 8 D0712 20:23:46.228555 30210 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:46.228832 30210 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.228894 30210 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc001ec5230 9 D0712 20:23:46.228910 30210 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:46.228930 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.228970 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 10 D0712 20:23:46.228985 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:46.236650 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.236681 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 11 D0712 20:23:46.236695 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:46.239133 30210 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.239174 30210 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc001ec5230 12 D0712 20:23:46.239190 30210 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:46.239212 30210 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.239219 30210 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc001ec5230 13 D0712 20:23:46.239228 30210 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:46.239248 30210 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0712 20:23:46.239343 30210 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0712 20:23:46.246744 30210 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.246773 30210 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc001ec5230 14 D0712 20:23:46.246786 30210 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:46.246853 30210 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.246885 30210 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.246926 30210 task_signals.go:204] [ 1008: 1009] Signal 1008, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.246946 30210 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.246959 30210 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.246964 30210 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.246939 30210 task_signals.go:204] [ 1008: 1011] Signal 1008, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.246990 30210 task_signals.go:204] [ 1008: 1012] Signal 1008, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.247019 30210 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.247040 30210 task_signals.go:204] [ 1008: 1010] Signal 1008, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.247074 30210 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.247083 30210 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.247096 30210 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.247105 30210 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.247111 30210 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.247120 30210 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.248138 30210 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.248159 30210 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.248182 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.248211 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.248223 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.248359 30210 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.248486 30210 task_signals.go:470] [ 7: 17] Notified of signal 23 D0712 20:23:46.248586 30210 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0712 20:23:46.249017 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.250310 30210 syscalls.go:262] [ 1013: 1013] Allocating stack with size of 8388608 bytes D0712 20:23:46.250435 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.251684 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.251719 30210 usertrap_amd64.go:106] [ 1013: 1013] Map a usertrap vma at 63000 D0712 20:23:46.251832 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 1 D0712 20:23:46.251859 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:46.252261 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.252287 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 2 D0712 20:23:46.252298 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:46.252873 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.252903 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 3 D0712 20:23:46.252915 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:46.259862 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.259885 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 4 D0712 20:23:46.259895 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:46.261027 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.261054 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 5 D0712 20:23:46.261066 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:46.261105 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.261119 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 6 D0712 20:23:46.261127 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:46.261305 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.261325 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 7 D0712 20:23:46.261333 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:46.261598 30210 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.261622 30210 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001b99e90 8 D0712 20:23:46.261634 30210 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:46.261833 30210 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.261890 30210 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001b99e90 9 D0712 20:23:46.261944 30210 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:46.261984 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.262004 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 10 D0712 20:23:46.262015 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:46.269213 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.269244 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 11 D0712 20:23:46.269256 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:46.272675 30210 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.272700 30210 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001b99e90 12 D0712 20:23:46.272709 30210 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:46.272754 30210 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.272771 30210 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001b99e90 13 D0712 20:23:46.272778 30210 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:46.272793 30210 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0712 20:23:46.272875 30210 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0712 20:23:46.273150 30210 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0712 20:23:46.273245 30210 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0712 20:23:46.280160 30210 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.280235 30210 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001b99e90 14 D0712 20:23:46.280328 30210 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:46.280401 30210 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.280498 30210 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.280536 30210 task_signals.go:204] [ 1013: 1015] Signal 1013, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.280554 30210 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.280564 30210 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.280575 30210 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.280591 30210 task_signals.go:204] [ 1013: 1014] Signal 1013, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.280626 30210 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.280639 30210 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.280649 30210 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.280536 30210 task_signals.go:204] [ 1013: 1017] Signal 1013, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.280743 30210 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.280785 30210 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.280793 30210 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.280662 30210 task_signals.go:204] [ 1013: 1016] Signal 1013, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.280811 30210 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.281981 30210 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.282063 30210 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.282082 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.282113 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.282165 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.282675 30210 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.283327 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.285520 30210 syscalls.go:262] [ 1018: 1018] Allocating stack with size of 8388608 bytes D0712 20:23:46.285626 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.287583 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.287627 30210 usertrap_amd64.go:106] [ 1018: 1018] Map a usertrap vma at 65000 D0712 20:23:46.287700 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 1 D0712 20:23:46.287730 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:46.288181 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.288208 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 2 D0712 20:23:46.288218 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:46.289007 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.289044 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 3 D0712 20:23:46.289086 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:46.297994 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.298029 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 4 D0712 20:23:46.298043 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:46.299540 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.299566 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 5 D0712 20:23:46.299575 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:46.299623 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.299641 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 6 D0712 20:23:46.299646 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:46.302961 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.302979 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 7 D0712 20:23:46.302990 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:46.303214 30210 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.303230 30210 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00129c060 8 D0712 20:23:46.303280 30210 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:46.303451 30210 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.303475 30210 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00129c060 9 D0712 20:23:46.303483 30210 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:46.303709 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.303812 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 10 D0712 20:23:46.303832 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:46.303962 30210 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.303987 30210 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00129c060 11 D0712 20:23:46.303998 30210 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:46.304043 30210 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.304059 30210 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00129c060 12 D0712 20:23:46.304066 30210 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:46.304088 30210 task_signals.go:470] [ 1018: 1021] Notified of signal 23 D0712 20:23:46.304150 30210 task_signals.go:179] [ 1018: 1021] Restarting syscall 202: interrupted by signal 23 D0712 20:23:46.304172 30210 task_signals.go:220] [ 1018: 1021] Signal 23: delivering to handler D0712 20:23:46.312036 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.312070 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 13 D0712 20:23:46.312083 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:46.315157 30210 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0712 20:23:46.315229 30210 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0712 20:23:46.326234 30210 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0712 20:23:46.326279 30210 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0712 20:23:46.327607 30210 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0712 20:23:46.328421 30210 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0712 20:23:46.328888 30210 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.328925 30210 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00129c060 14 D0712 20:23:46.328967 30210 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:46.329377 30210 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.329484 30210 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.329513 30210 task_signals.go:204] [ 1018: 1020] Signal 1018, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.329543 30210 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.329581 30210 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.329591 30210 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.329619 30210 task_signals.go:204] [ 1018: 1019] Signal 1018, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.329641 30210 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.329650 30210 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.329656 30210 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.329670 30210 task_signals.go:204] [ 1018: 1021] Signal 1018, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.329686 30210 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.329691 30210 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.329696 30210 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.329692 30210 task_signals.go:204] [ 1018: 1022] Signal 1018, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.329710 30210 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.330964 30210 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.330995 30210 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.331009 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.331056 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.331099 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.331234 30210 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.332329 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.333657 30210 syscalls.go:262] [ 1023: 1023] Allocating stack with size of 8388608 bytes D0712 20:23:46.333839 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.335591 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.335643 30210 usertrap_amd64.go:106] [ 1023: 1023] Map a usertrap vma at 63000 D0712 20:23:46.335761 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 1 D0712 20:23:46.335816 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:46.336346 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.336377 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 2 D0712 20:23:46.336396 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:46.337367 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.337401 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 3 D0712 20:23:46.337416 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:46.345532 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.345564 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 4 D0712 20:23:46.345606 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:46.347051 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.347123 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 5 D0712 20:23:46.347147 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:46.347209 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.347269 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 6 D0712 20:23:46.347277 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:46.348321 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.348390 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 7 D0712 20:23:46.348409 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:46.348710 30210 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.348743 30210 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001ec5440 8 D0712 20:23:46.348758 30210 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:46.349058 30210 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.349109 30210 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001ec5440 9 D0712 20:23:46.349139 30210 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:46.349190 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.349221 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 10 D0712 20:23:46.349234 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:46.349443 30210 usertrap_amd64.go:212] [ 1023: 1026] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.349468 30210 usertrap_amd64.go:122] [ 1023: 1026] Allocate a new trap: 0xc001ec5440 11 D0712 20:23:46.349484 30210 usertrap_amd64.go:225] [ 1023: 1026] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:46.358239 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.358274 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 12 D0712 20:23:46.358290 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:46.361471 30210 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.361496 30210 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001ec5440 13 D0712 20:23:46.361512 30210 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:46.361591 30210 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.361610 30210 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001ec5440 14 D0712 20:23:46.361621 30210 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:46.361728 30210 task_signals.go:470] [ 1023: 1023] Notified of signal 23 D0712 20:23:46.361776 30210 task_signals.go:220] [ 1023: 1023] Signal 23: delivering to handler D0712 20:23:46.370649 30210 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.370676 30210 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001ec5440 15 D0712 20:23:46.370689 30210 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:23:46.370915 30210 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.370952 30210 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.370978 30210 task_signals.go:204] [ 1023: 1024] Signal 1023, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.370994 30210 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.371004 30210 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.371019 30210 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.371040 30210 task_signals.go:204] [ 1023: 1025] Signal 1023, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.371051 30210 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.371062 30210 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.371068 30210 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.371083 30210 task_signals.go:204] [ 1023: 1026] Signal 1023, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.371107 30210 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.371115 30210 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.371130 30210 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.371148 30210 task_signals.go:204] [ 1023: 1027] Signal 1023, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.371168 30210 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.372578 30210 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.372609 30210 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.372622 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.373096 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.373125 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.373362 30210 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.375322 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.378535 30210 syscalls.go:262] [ 1028: 1028] Allocating stack with size of 8388608 bytes D0712 20:23:46.379290 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.388605 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.388658 30210 usertrap_amd64.go:106] [ 1028: 1028] Map a usertrap vma at 63000 D0712 20:23:46.388764 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 1 D0712 20:23:46.388817 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:46.389387 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.389420 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 2 D0712 20:23:46.389442 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:46.390308 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.390349 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 3 D0712 20:23:46.390367 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:46.398896 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.398944 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 4 D0712 20:23:46.398962 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:46.400571 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.400596 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 5 D0712 20:23:46.400608 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:46.400667 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.400676 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 6 D0712 20:23:46.400689 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:46.401009 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.401035 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 7 D0712 20:23:46.401042 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:46.401398 30210 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.401433 30210 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc001ec5590 8 D0712 20:23:46.401445 30210 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:46.401687 30210 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.401701 30210 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc001ec5590 9 D0712 20:23:46.401846 30210 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:46.402095 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.402135 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 10 D0712 20:23:46.402151 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:46.402295 30210 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.402321 30210 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc001ec5590 11 D0712 20:23:46.402329 30210 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:46.402390 30210 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.402407 30210 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc001ec5590 12 D0712 20:23:46.402417 30210 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:46.402447 30210 task_signals.go:470] [ 1028: 1031] Notified of signal 23 D0712 20:23:46.402491 30210 task_signals.go:220] [ 1028: 1031] Signal 23: delivering to handler D0712 20:23:46.402651 30210 task_signals.go:470] [ 1028: 1031] Notified of signal 23 D0712 20:23:46.402697 30210 task_signals.go:220] [ 1028: 1031] Signal 23: delivering to handler D0712 20:23:46.410523 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.410555 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 13 D0712 20:23:46.410567 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:46.412887 30210 task_signals.go:470] [ 1028: 1028] Notified of signal 23 D0712 20:23:46.413029 30210 task_signals.go:220] [ 1028: 1028] Signal 23: delivering to handler D0712 20:23:46.419620 30210 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.419655 30210 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc001ec5590 14 D0712 20:23:46.419670 30210 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:46.419720 30210 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.419758 30210 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.419782 30210 task_signals.go:204] [ 1028: 1029] Signal 1028, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.419804 30210 task_signals.go:204] [ 1028: 1031] Signal 1028, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.419806 30210 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.419884 30210 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.419898 30210 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.419917 30210 task_signals.go:204] [ 1028: 1030] Signal 1028, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.419936 30210 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.419949 30210 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.419969 30210 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.419983 30210 task_signals.go:204] [ 1028: 1032] Signal 1028, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.420002 30210 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.420009 30210 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.420014 30210 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.420024 30210 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.421151 30210 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.421217 30210 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.421289 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.421339 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.421360 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.421460 30210 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.421611 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:46.421748 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:46.422150 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.423400 30210 syscalls.go:262] [ 1033: 1033] Allocating stack with size of 8388608 bytes D0712 20:23:46.423533 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.425414 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.425443 30210 usertrap_amd64.go:106] [ 1033: 1033] Map a usertrap vma at 61000 D0712 20:23:46.425496 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 1 D0712 20:23:46.425525 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:46.425879 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.425898 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 2 D0712 20:23:46.425917 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:46.426262 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.426284 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 3 D0712 20:23:46.426294 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:46.431966 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.432015 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 4 D0712 20:23:46.432031 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:46.433888 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.433917 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 5 D0712 20:23:46.433927 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:46.434185 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.434254 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 6 D0712 20:23:46.434311 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:46.434983 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.435010 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 7 D0712 20:23:46.435021 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:46.435259 30210 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.435288 30210 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc001973cb0 8 D0712 20:23:46.435300 30210 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:46.435501 30210 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.435528 30210 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc001973cb0 9 D0712 20:23:46.435544 30210 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:46.435567 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.435573 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 10 D0712 20:23:46.435661 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:46.445522 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.445551 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 11 D0712 20:23:46.445570 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:46.448556 30210 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.448647 30210 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc001973cb0 12 D0712 20:23:46.448672 30210 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:46.448776 30210 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.448838 30210 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc001973cb0 13 D0712 20:23:46.448863 30210 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:46.448917 30210 task_signals.go:470] [ 1033: 1033] Notified of signal 23 D0712 20:23:46.449998 30210 task_signals.go:220] [ 1033: 1033] Signal 23: delivering to handler D0712 20:23:46.460531 30210 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.460589 30210 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc001973cb0 14 D0712 20:23:46.460610 30210 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:46.460688 30210 task_exit.go:204] [ 1033: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.460710 30210 task_exit.go:204] [ 1033: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.460742 30210 task_signals.go:204] [ 1033: 1035] Signal 1033, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.460777 30210 task_exit.go:204] [ 1033: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.460810 30210 task_exit.go:204] [ 1033: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.460817 30210 task_exit.go:204] [ 1033: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.460819 30210 task_signals.go:204] [ 1033: 1037] Signal 1033, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.460840 30210 task_signals.go:204] [ 1033: 1036] Signal 1033, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.460876 30210 task_signals.go:204] [ 1033: 1038] Signal 1033, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.460888 30210 task_exit.go:204] [ 1033: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.460901 30210 task_signals.go:204] [ 1033: 1034] Signal 1033, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.460915 30210 task_exit.go:204] [ 1033: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.460921 30210 task_exit.go:204] [ 1033: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.460966 30210 task_exit.go:204] [ 1033: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.460978 30210 task_exit.go:204] [ 1033: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.460997 30210 task_exit.go:204] [ 1033: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.461009 30210 task_exit.go:204] [ 1033: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.461028 30210 task_exit.go:204] [ 1033: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.461050 30210 task_exit.go:204] [ 1033: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.461064 30210 task_exit.go:204] [ 1033: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.462471 30210 task_exit.go:204] [ 1033: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.462515 30210 task_exit.go:204] [ 1033: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.462533 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.462606 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.462630 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.462792 30210 task_exit.go:204] [ 1033: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.463725 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.465140 30210 syscalls.go:262] [ 1039: 1039] Allocating stack with size of 8388608 bytes D0712 20:23:46.465277 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.469036 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.469088 30210 usertrap_amd64.go:106] [ 1039: 1039] Map a usertrap vma at 66000 D0712 20:23:46.469170 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 1 D0712 20:23:46.469197 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:46.469584 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.469610 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 2 D0712 20:23:46.469623 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:46.470572 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.470605 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 3 D0712 20:23:46.470621 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:46.477043 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.477073 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 4 D0712 20:23:46.477084 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:46.478306 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.478335 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 5 D0712 20:23:46.478349 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:46.478430 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.478446 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 6 D0712 20:23:46.478452 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:46.478716 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.478740 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 7 D0712 20:23:46.478748 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:46.479015 30210 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.479034 30210 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00129c5a0 8 D0712 20:23:46.479085 30210 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:46.479246 30210 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.479270 30210 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00129c5a0 9 D0712 20:23:46.479282 30210 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:46.479335 30210 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.479363 30210 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00129c5a0 10 D0712 20:23:46.479504 30210 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b020 trap addr 66320 ([184 39 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:46.479650 30210 usertrap_amd64.go:212] [ 1039: 1041] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.479664 30210 usertrap_amd64.go:122] [ 1039: 1041] Allocate a new trap: 0xc00129c5a0 11 D0712 20:23:46.479675 30210 usertrap_amd64.go:225] [ 1039: 1041] Apply the binary patch addr 46b57c trap addr 66370 ([184 202 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:46.479688 30210 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.479694 30210 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00129c5a0 12 D0712 20:23:46.479708 30210 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:46.479747 30210 task_signals.go:481] [ 1039: 1039] No task notified of signal 23 D0712 20:23:46.479782 30210 task_signals.go:220] [ 1039: 1039] Signal 23: delivering to handler D0712 20:23:46.486239 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.486254 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 13 D0712 20:23:46.486263 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:46.491400 30210 task_signals.go:470] [ 1039: 1039] Notified of signal 23 D0712 20:23:46.492012 30210 task_signals.go:220] [ 1039: 1039] Signal 23: delivering to handler D0712 20:23:46.495780 30210 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.495807 30210 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00129c5a0 14 D0712 20:23:46.495816 30210 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:46.495890 30210 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.495924 30210 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.495950 30210 task_signals.go:204] [ 1039: 1041] Signal 1039, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.495943 30210 task_signals.go:204] [ 1039: 1040] Signal 1039, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.495953 30210 task_signals.go:204] [ 1039: 1043] Signal 1039, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.495969 30210 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.495998 30210 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.496020 30210 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.496041 30210 task_signals.go:204] [ 1039: 1044] Signal 1039, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.496066 30210 task_exit.go:204] [ 1039: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.496074 30210 task_exit.go:204] [ 1039: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.496080 30210 task_exit.go:204] [ 1039: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.496094 30210 task_signals.go:204] [ 1039: 1042] Signal 1039, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.496110 30210 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.496126 30210 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.496145 30210 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.496219 30210 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.496253 30210 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.496262 30210 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.496274 30210 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.497400 30210 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.497446 30210 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.497467 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.497496 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.497502 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.497552 30210 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.498285 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.500046 30210 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0712 20:23:46.500361 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.502378 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.502464 30210 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 67000 D0712 20:23:46.502553 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 1 D0712 20:23:46.502585 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:46.502885 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.502904 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 2 D0712 20:23:46.502921 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:46.503316 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.503335 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 3 D0712 20:23:46.503346 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:46.509958 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.510026 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 4 D0712 20:23:46.510043 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:46.511040 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.511069 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 5 D0712 20:23:46.511080 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:46.511143 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.511163 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 6 D0712 20:23:46.511172 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:46.511528 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.511549 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 7 D0712 20:23:46.511558 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:46.511743 30210 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.511766 30210 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00129c6f0 8 D0712 20:23:46.511775 30210 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:46.512109 30210 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.512302 30210 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00129c6f0 9 D0712 20:23:46.512387 30210 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:46.512445 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.512488 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 10 D0712 20:23:46.512527 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:46.520585 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.520628 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 11 D0712 20:23:46.520642 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:46.524558 30210 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.524599 30210 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00129c6f0 12 D0712 20:23:46.524614 30210 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:46.524677 30210 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.524709 30210 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00129c6f0 13 D0712 20:23:46.524719 30210 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:46.524747 30210 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0712 20:23:46.524807 30210 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler I0712 20:23:46.532840 30210 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0712 20:23:46.532990 30210 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.533010 30210 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00129c6f0 14 D0712 20:23:46.533026 30210 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:46.533067 30210 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.533104 30210 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.533136 30210 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.533164 30210 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.533141 30210 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.533174 30210 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.533162 30210 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.533179 30210 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.533196 30210 task_signals.go:204] [ 1045: 1050] Signal 1045, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.533212 30210 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.533219 30210 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.533224 30210 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.533213 30210 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.533233 30210 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.533241 30210 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.533245 30210 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.533254 30210 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.533270 30210 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.533278 30210 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.533292 30210 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.534443 30210 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.534474 30210 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.534495 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.534523 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.534532 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.534635 30210 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.535347 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.536869 30210 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0712 20:23:46.537116 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.538049 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.538096 30210 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 61000 D0712 20:23:46.538393 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 1 D0712 20:23:46.538432 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:46.538654 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.538673 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 2 D0712 20:23:46.538681 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:46.539451 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.539470 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 3 D0712 20:23:46.539482 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:46.545392 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.545434 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 4 D0712 20:23:46.545449 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:46.546664 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.546691 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 5 D0712 20:23:46.546704 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:46.546798 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.546808 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 6 D0712 20:23:46.546815 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:46.547003 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.547024 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 7 D0712 20:23:46.547031 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:46.547217 30210 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.547263 30210 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc00129c900 8 D0712 20:23:46.547281 30210 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:46.547518 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.547544 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 9 D0712 20:23:46.547555 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:46.547604 30210 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.547621 30210 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc00129c900 10 D0712 20:23:46.547634 30210 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:46.547735 30210 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.547756 30210 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc00129c900 11 D0712 20:23:46.547849 30210 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:46.548077 30210 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.548106 30210 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc00129c900 12 D0712 20:23:46.548117 30210 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:46.548137 30210 task_signals.go:470] [ 1051: 1054] Notified of signal 23 D0712 20:23:46.548167 30210 task_signals.go:179] [ 1051: 1054] Restarting syscall 202: interrupted by signal 23 D0712 20:23:46.548189 30210 task_signals.go:220] [ 1051: 1054] Signal 23: delivering to handler D0712 20:23:46.554762 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.554800 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 13 D0712 20:23:46.554812 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:46.558374 30210 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0712 20:23:46.558409 30210 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler I0712 20:23:46.566242 30210 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0712 20:23:46.566338 30210 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.566355 30210 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc00129c900 14 D0712 20:23:46.566372 30210 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:46.566479 30210 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.566513 30210 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.566519 30210 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.566543 30210 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.566552 30210 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.566561 30210 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.566600 30210 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.566620 30210 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.566526 30210 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.566640 30210 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.566648 30210 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.566664 30210 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.566677 30210 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.566696 30210 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.566703 30210 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.566714 30210 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.567904 30210 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.567935 30210 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.567954 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.567984 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.567992 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.568206 30210 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.568743 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:46.568914 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.570532 30210 syscalls.go:262] [ 1056: 1056] Allocating stack with size of 8388608 bytes D0712 20:23:46.570743 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.570881 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:46.572247 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.572288 30210 usertrap_amd64.go:106] [ 1056: 1056] Map a usertrap vma at 64000 D0712 20:23:46.572367 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 1 D0712 20:23:46.572418 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.572705 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.572738 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 2 D0712 20:23:46.572756 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.573459 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.573486 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 3 D0712 20:23:46.573497 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.578173 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.578205 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 4 D0712 20:23:46.578219 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.579196 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.579227 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 5 D0712 20:23:46.579238 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.579292 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.579314 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 6 D0712 20:23:46.579333 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.579583 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.579605 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 7 D0712 20:23:46.579613 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.579744 30210 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.579759 30210 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0005e2000 8 D0712 20:23:46.579766 30210 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.579937 30210 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.579959 30210 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0005e2000 9 D0712 20:23:46.580008 30210 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.580086 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.580111 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 10 D0712 20:23:46.580120 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.588153 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.588197 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 11 D0712 20:23:46.588210 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.591100 30210 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.591139 30210 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0005e2000 12 D0712 20:23:46.591154 30210 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.591208 30210 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.591275 30210 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0005e2000 13 D0712 20:23:46.591299 30210 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.591353 30210 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0712 20:23:46.591422 30210 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler I0712 20:23:46.597324 30210 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0712 20:23:46.597415 30210 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.597428 30210 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0005e2000 14 D0712 20:23:46.597441 30210 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.597489 30210 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.597519 30210 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.597532 30210 task_signals.go:204] [ 1056: 1058] Signal 1056, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.597555 30210 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.597567 30210 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.597575 30210 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.597541 30210 task_signals.go:204] [ 1056: 1059] Signal 1056, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.597593 30210 task_signals.go:204] [ 1056: 1060] Signal 1056, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.597597 30210 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.597611 30210 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.597534 30210 task_signals.go:204] [ 1056: 1057] Signal 1056, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.597617 30210 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.597645 30210 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.597678 30210 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.597682 30210 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.597690 30210 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.598835 30210 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.598868 30210 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.598888 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.598955 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.598977 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.599089 30210 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.599576 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.600905 30210 syscalls.go:262] [ 1061: 1061] Allocating stack with size of 8388608 bytes D0712 20:23:46.601076 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.601928 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.601962 30210 usertrap_amd64.go:106] [ 1061: 1061] Map a usertrap vma at 65000 D0712 20:23:46.602067 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 1 D0712 20:23:46.602094 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:46.602295 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.602335 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 2 D0712 20:23:46.602344 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:46.603112 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.603178 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 3 D0712 20:23:46.603206 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:46.609920 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.609954 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 4 D0712 20:23:46.609975 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:46.610857 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.610880 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 5 D0712 20:23:46.610892 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:46.610947 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.610956 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 6 D0712 20:23:46.610964 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:46.611300 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.611326 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 7 D0712 20:23:46.611336 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:46.611496 30210 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.611518 30210 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc0007de120 8 D0712 20:23:46.611544 30210 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:46.611777 30210 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.611802 30210 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc0007de120 9 D0712 20:23:46.611815 30210 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:46.611909 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.611936 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 10 D0712 20:23:46.611970 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:46.618376 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.618402 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 11 D0712 20:23:46.618415 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:46.622234 30210 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.622262 30210 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc0007de120 12 D0712 20:23:46.622273 30210 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:46.622329 30210 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.622350 30210 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc0007de120 13 D0712 20:23:46.622381 30210 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:46.622423 30210 task_signals.go:470] [ 1061: 1061] Notified of signal 23 D0712 20:23:46.623840 30210 task_signals.go:220] [ 1061: 1061] Signal 23: delivering to handler I0712 20:23:46.626856 30210 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0712 20:23:46.626934 30210 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.626956 30210 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc0007de120 14 D0712 20:23:46.626969 30210 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:46.627044 30210 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.627069 30210 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.627110 30210 task_signals.go:204] [ 1061: 1064] Signal 1061, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.627122 30210 task_signals.go:204] [ 1061: 1065] Signal 1061, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.627141 30210 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.627132 30210 task_signals.go:204] [ 1061: 1063] Signal 1061, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.627131 30210 task_signals.go:204] [ 1061: 1062] Signal 1061, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.627155 30210 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.627171 30210 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.627178 30210 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.627189 30210 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.627198 30210 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.627204 30210 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.627216 30210 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.627312 30210 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.627335 30210 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.628185 30210 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.628230 30210 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.628244 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.628304 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.628362 30210 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.628405 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:46.628431 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:46.628844 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.630155 30210 syscalls.go:262] [ 1066: 1066] Allocating stack with size of 8388608 bytes D0712 20:23:46.630260 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.631276 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.631313 30210 usertrap_amd64.go:106] [ 1066: 1066] Map a usertrap vma at 68000 D0712 20:23:46.631392 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 1 D0712 20:23:46.631417 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:46.631655 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.631676 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 2 D0712 20:23:46.631685 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:46.632047 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.632067 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 3 D0712 20:23:46.632076 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:46.637185 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.637214 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 4 D0712 20:23:46.637224 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:46.638215 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.638230 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 5 D0712 20:23:46.638237 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:46.638277 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.638293 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 6 D0712 20:23:46.638304 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:46.638766 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.638783 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 7 D0712 20:23:46.638793 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:46.638911 30210 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.638930 30210 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a780c0 8 D0712 20:23:46.638938 30210 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:46.639077 30210 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.639099 30210 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a780c0 9 D0712 20:23:46.639107 30210 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:46.639164 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.639180 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 10 D0712 20:23:46.639189 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:46.639335 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.639368 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 11 D0712 20:23:46.639377 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:46.645211 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.645238 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 12 D0712 20:23:46.645252 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:46.650236 30210 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.650277 30210 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a780c0 13 D0712 20:23:46.650290 30210 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:46.650353 30210 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.650382 30210 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a780c0 14 D0712 20:23:46.650394 30210 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:46.650439 30210 task_signals.go:470] [ 1066: 1066] Notified of signal 23 D0712 20:23:46.650523 30210 task_signals.go:220] [ 1066: 1066] Signal 23: delivering to handler D0712 20:23:46.653747 30210 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.653771 30210 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a780c0 15 D0712 20:23:46.653780 30210 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:46.653826 30210 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.653857 30210 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.653875 30210 task_signals.go:204] [ 1066: 1069] Signal 1066, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.653873 30210 task_signals.go:204] [ 1066: 1068] Signal 1066, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.653892 30210 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.653903 30210 task_signals.go:204] [ 1066: 1070] Signal 1066, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.653917 30210 task_signals.go:204] [ 1066: 1067] Signal 1066, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.653932 30210 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.653942 30210 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.653958 30210 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.653967 30210 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.653973 30210 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.653997 30210 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.654002 30210 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.654018 30210 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.654037 30210 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.654989 30210 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.655026 30210 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.655041 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.655077 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.655138 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.655232 30210 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.655629 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.656351 30210 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0712 20:23:46.656827 30210 syscalls.go:262] [ 1071: 1071] Allocating stack with size of 8388608 bytes D0712 20:23:46.657029 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.657126 30210 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0712 20:23:46.658404 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.658440 30210 usertrap_amd64.go:106] [ 1071: 1071] Map a usertrap vma at 67000 D0712 20:23:46.658505 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 1 D0712 20:23:46.658538 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:46.658802 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.658832 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 2 D0712 20:23:46.658842 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:46.659355 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.659381 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 3 D0712 20:23:46.659392 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:46.664235 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.664265 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 4 D0712 20:23:46.664275 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:46.665320 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.665349 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 5 D0712 20:23:46.665358 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:46.665388 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.665396 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 6 D0712 20:23:46.665403 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:46.665562 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.665576 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 7 D0712 20:23:46.665587 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:46.665674 30210 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.665699 30210 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00129ce40 8 D0712 20:23:46.665708 30210 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:46.665824 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.665879 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 9 D0712 20:23:46.665920 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:46.666022 30210 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.666051 30210 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00129ce40 10 D0712 20:23:46.666063 30210 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:46.672133 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.672167 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 11 D0712 20:23:46.672179 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:46.676126 30210 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.676213 30210 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00129ce40 12 D0712 20:23:46.676232 30210 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:46.676278 30210 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.676298 30210 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00129ce40 13 D0712 20:23:46.676311 30210 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:46.676397 30210 task_signals.go:470] [ 1071: 1071] Notified of signal 23 D0712 20:23:46.677794 30210 task_signals.go:220] [ 1071: 1071] Signal 23: delivering to handler D0712 20:23:46.681124 30210 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.681154 30210 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00129ce40 14 D0712 20:23:46.681168 30210 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:46.681192 30210 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.681214 30210 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.681217 30210 task_signals.go:204] [ 1071: 1073] Signal 1071, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.681229 30210 task_signals.go:204] [ 1071: 1072] Signal 1071, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.681241 30210 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.681235 30210 task_signals.go:204] [ 1071: 1074] Signal 1071, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.681254 30210 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.681272 30210 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.681289 30210 task_signals.go:204] [ 1071: 1075] Signal 1071, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.681310 30210 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.681322 30210 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.681329 30210 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.681341 30210 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.681348 30210 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.681361 30210 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.681370 30210 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.682440 30210 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.682520 30210 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.682594 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.683497 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.683528 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.683638 30210 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.685323 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.686622 30210 syscalls.go:262] [ 1076: 1076] Allocating stack with size of 8388608 bytes D0712 20:23:46.686714 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.687246 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.687283 30210 usertrap_amd64.go:106] [ 1076: 1076] Map a usertrap vma at 69000 D0712 20:23:46.687352 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 1 D0712 20:23:46.687378 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.687888 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.687910 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 2 D0712 20:23:46.687918 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.688621 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.688637 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 3 D0712 20:23:46.688648 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.694617 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.694654 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 4 D0712 20:23:46.694664 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.695658 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.695708 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 5 D0712 20:23:46.695720 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.695777 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.695792 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 6 D0712 20:23:46.695812 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.696330 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.696347 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 7 D0712 20:23:46.696362 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.696564 30210 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.696585 30210 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00129d110 8 D0712 20:23:46.696595 30210 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.696775 30210 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.696827 30210 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00129d110 9 D0712 20:23:46.696846 30210 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.697018 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.697035 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 10 D0712 20:23:46.697047 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.703914 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.703942 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 11 D0712 20:23:46.703955 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.708008 30210 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.708043 30210 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00129d110 12 D0712 20:23:46.708056 30210 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.708112 30210 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.708129 30210 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00129d110 13 D0712 20:23:46.708137 30210 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.708154 30210 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0712 20:23:46.708203 30210 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0712 20:23:46.714940 30210 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.714986 30210 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00129d110 14 D0712 20:23:46.715001 30210 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.715089 30210 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.715115 30210 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.715150 30210 task_signals.go:204] [ 1076: 1079] Signal 1076, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.715164 30210 task_signals.go:204] [ 1076: 1077] Signal 1076, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.715179 30210 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.715189 30210 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.715177 30210 task_signals.go:204] [ 1076: 1078] Signal 1076, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.715209 30210 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.715218 30210 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.715233 30210 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.715247 30210 task_signals.go:204] [ 1076: 1080] Signal 1076, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.715249 30210 task_signals.go:204] [ 1076: 1081] Signal 1076, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.715259 30210 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.715270 30210 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.715286 30210 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.715304 30210 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.715311 30210 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.715319 30210 task_exit.go:204] [ 1076: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.715460 30210 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.715487 30210 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.716482 30210 task_exit.go:204] [ 1076: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.716522 30210 task_exit.go:204] [ 1076: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.716537 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.716606 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.716632 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.716752 30210 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.717500 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.719179 30210 syscalls.go:262] [ 1082: 1082] Allocating stack with size of 8388608 bytes D0712 20:23:46.719276 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.721658 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.721699 30210 usertrap_amd64.go:106] [ 1082: 1082] Map a usertrap vma at 68000 D0712 20:23:46.721813 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 1 D0712 20:23:46.721840 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:46.722444 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.722473 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 2 D0712 20:23:46.722491 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:46.725510 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.725535 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 3 D0712 20:23:46.725549 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:46.731301 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.731333 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 4 D0712 20:23:46.731347 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:46.732525 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.732562 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 5 D0712 20:23:46.732576 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:46.732734 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.732759 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 6 D0712 20:23:46.732768 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:46.733535 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.733603 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 7 D0712 20:23:46.733626 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:46.733890 30210 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.733915 30210 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc000561b60 8 D0712 20:23:46.733928 30210 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:46.734365 30210 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.734391 30210 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc000561b60 9 D0712 20:23:46.734406 30210 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:46.734420 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.734427 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 10 D0712 20:23:46.734531 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:46.734639 30210 usertrap_amd64.go:212] [ 1082: 1085] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.734670 30210 usertrap_amd64.go:122] [ 1082: 1085] Allocate a new trap: 0xc000561b60 11 D0712 20:23:46.734690 30210 usertrap_amd64.go:225] [ 1082: 1085] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:46.743447 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.743493 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 12 D0712 20:23:46.743508 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:46.746711 30210 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.746757 30210 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc000561b60 13 D0712 20:23:46.746775 30210 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:46.746892 30210 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.746907 30210 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc000561b60 14 D0712 20:23:46.746918 30210 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:46.746966 30210 task_signals.go:470] [ 1082: 1082] Notified of signal 23 D0712 20:23:46.747060 30210 task_signals.go:220] [ 1082: 1082] Signal 23: delivering to handler D0712 20:23:46.755320 30210 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.755371 30210 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc000561b60 15 D0712 20:23:46.755388 30210 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:46.755471 30210 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.755513 30210 task_signals.go:204] [ 1082: 1084] Signal 1082, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.755543 30210 task_signals.go:204] [ 1082: 1083] Signal 1082, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.755556 30210 task_signals.go:204] [ 1082: 1087] Signal 1082, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.755570 30210 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.755616 30210 task_signals.go:204] [ 1082: 1086] Signal 1082, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.755643 30210 task_signals.go:204] [ 1082: 1085] Signal 1082, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.755677 30210 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.755699 30210 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.755705 30210 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.755844 30210 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.755872 30210 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.755885 30210 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.755901 30210 task_exit.go:204] [ 1082: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.755923 30210 task_exit.go:204] [ 1082: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.755929 30210 task_exit.go:204] [ 1082: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.755943 30210 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.755954 30210 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.755961 30210 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.755984 30210 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.758119 30210 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.758141 30210 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.758156 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.758220 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.758366 30210 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.758799 30210 task_signals.go:470] [ 7: 7] Notified of signal 23 D0712 20:23:46.758848 30210 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0712 20:23:46.758932 30210 task_signals.go:470] [ 7: 7] Notified of signal 23 D0712 20:23:46.758965 30210 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0712 20:23:46.759322 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.760980 30210 syscalls.go:262] [ 1088: 1088] Allocating stack with size of 8388608 bytes D0712 20:23:46.761101 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.765039 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.765116 30210 usertrap_amd64.go:106] [ 1088: 1088] Map a usertrap vma at 68000 D0712 20:23:46.765239 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 1 D0712 20:23:46.765310 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:46.765863 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.765907 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 2 D0712 20:23:46.765926 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:46.766808 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.766867 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 3 D0712 20:23:46.766888 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:46.774032 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.774090 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 4 D0712 20:23:46.774110 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:46.775275 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.775325 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 5 D0712 20:23:46.775343 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:46.775418 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.775428 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 6 D0712 20:23:46.775446 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:46.775899 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.775926 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 7 D0712 20:23:46.775936 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:46.776190 30210 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.776246 30210 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000561c50 8 D0712 20:23:46.776263 30210 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:46.776490 30210 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.776536 30210 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000561c50 9 D0712 20:23:46.776554 30210 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:46.776886 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.776908 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 10 D0712 20:23:46.776927 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:46.785891 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.785927 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 11 D0712 20:23:46.785943 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:46.788704 30210 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.788740 30210 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000561c50 12 D0712 20:23:46.788759 30210 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:46.789154 30210 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.789192 30210 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000561c50 13 D0712 20:23:46.789207 30210 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:46.789265 30210 task_signals.go:470] [ 1088: 1088] Notified of signal 23 D0712 20:23:46.789359 30210 task_signals.go:220] [ 1088: 1088] Signal 23: delivering to handler D0712 20:23:46.797974 30210 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.798019 30210 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000561c50 14 D0712 20:23:46.798039 30210 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:46.798115 30210 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.798150 30210 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.798195 30210 task_signals.go:204] [ 1088: 1092] Signal 1088, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.798214 30210 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.798204 30210 task_signals.go:204] [ 1088: 1091] Signal 1088, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.798224 30210 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.798260 30210 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.798181 30210 task_signals.go:204] [ 1088: 1090] Signal 1088, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.798295 30210 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.798313 30210 task_signals.go:204] [ 1088: 1089] Signal 1088, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.798334 30210 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.798349 30210 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.798368 30210 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.798387 30210 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.798393 30210 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.798422 30210 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.800058 30210 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.800094 30210 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.800113 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.800145 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.800155 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.800281 30210 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.801136 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.802856 30210 syscalls.go:262] [ 1093: 1093] Allocating stack with size of 8388608 bytes D0712 20:23:46.803019 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.805689 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.805765 30210 usertrap_amd64.go:106] [ 1093: 1093] Map a usertrap vma at 62000 D0712 20:23:46.805837 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 1 D0712 20:23:46.805872 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:46.807140 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.807184 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 2 D0712 20:23:46.807199 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:46.807892 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.807922 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 3 D0712 20:23:46.807972 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:46.815100 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.815147 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 4 D0712 20:23:46.815166 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:46.816430 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.816466 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 5 D0712 20:23:46.816481 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:46.816530 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.816538 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 6 D0712 20:23:46.816546 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:46.817062 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.817096 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 7 D0712 20:23:46.817113 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:46.817599 30210 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.817754 30210 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0005e25d0 8 D0712 20:23:46.817785 30210 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:46.818035 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.818096 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 9 D0712 20:23:46.818115 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:46.818217 30210 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.818298 30210 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0005e25d0 10 D0712 20:23:46.818321 30210 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:46.819792 30210 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.819837 30210 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0005e25d0 11 D0712 20:23:46.819856 30210 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:46.819970 30210 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.819987 30210 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0005e25d0 12 D0712 20:23:46.820038 30210 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:46.820128 30210 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0712 20:23:46.820180 30210 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler D0712 20:23:46.828661 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.828696 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 13 D0712 20:23:46.828721 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:46.831486 30210 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0712 20:23:46.831899 30210 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler D0712 20:23:46.843275 30210 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0712 20:23:46.845137 30210 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler I0712 20:23:46.848590 30210 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0712 20:23:46.848789 30210 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.848826 30210 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0005e25d0 14 D0712 20:23:46.848847 30210 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:46.848915 30210 task_exit.go:204] [ 1093: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.848987 30210 task_signals.go:204] [ 1093: 1094] Signal 1093, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.849024 30210 task_signals.go:204] [ 1093: 1097] Signal 1093, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.849039 30210 task_exit.go:204] [ 1093: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.849065 30210 task_signals.go:204] [ 1093: 1096] Signal 1093, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.849080 30210 task_signals.go:204] [ 1093: 1095] Signal 1093, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.849093 30210 task_exit.go:204] [ 1093: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.849106 30210 task_exit.go:204] [ 1093: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.849111 30210 task_exit.go:204] [ 1093: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.849126 30210 task_exit.go:204] [ 1093: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.849135 30210 task_exit.go:204] [ 1093: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.849141 30210 task_exit.go:204] [ 1093: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.849154 30210 task_exit.go:204] [ 1093: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.849181 30210 task_exit.go:204] [ 1093: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.849187 30210 task_exit.go:204] [ 1093: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.849200 30210 task_exit.go:204] [ 1093: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.850895 30210 task_exit.go:204] [ 1093: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.850947 30210 task_exit.go:204] [ 1093: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.850966 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.851066 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.851090 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.851189 30210 task_exit.go:204] [ 1093: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.852675 30210 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.854234 30210 syscalls.go:262] [ 1098: 1098] Allocating stack with size of 8388608 bytes D0712 20:23:46.854363 30210 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.855684 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.855737 30210 usertrap_amd64.go:106] [ 1098: 1098] Map a usertrap vma at 64000 D0712 20:23:46.855821 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 1 D0712 20:23:46.855856 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.856704 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.856737 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 2 D0712 20:23:46.856753 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.857317 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.857435 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 3 D0712 20:23:46.857459 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.864321 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.864361 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 4 D0712 20:23:46.864381 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.865680 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.865717 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 5 D0712 20:23:46.865734 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.865783 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.865789 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 6 D0712 20:23:46.865795 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.865962 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.865980 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 7 D0712 20:23:46.865986 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.866158 30210 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.866237 30210 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc00129d950 8 D0712 20:23:46.866258 30210 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.866500 30210 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.866564 30210 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc00129d950 9 D0712 20:23:46.866586 30210 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.866604 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.866611 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 10 D0712 20:23:46.866620 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.875190 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.875234 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 11 D0712 20:23:46.875249 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.877782 30210 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.877826 30210 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc00129d950 12 D0712 20:23:46.877843 30210 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.877929 30210 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.877942 30210 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc00129d950 13 D0712 20:23:46.877952 30210 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.877974 30210 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0712 20:23:46.878102 30210 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0712 20:23:46.878311 30210 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0712 20:23:46.878416 30210 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler I0712 20:23:46.887681 30210 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0712 20:23:46.887787 30210 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.887822 30210 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc00129d950 14 D0712 20:23:46.887840 30210 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.887926 30210 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.887964 30210 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.887993 30210 task_signals.go:204] [ 1098: 1102] Signal 1098, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.888009 30210 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.887994 30210 task_signals.go:204] [ 1098: 1100] Signal 1098, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.888012 30210 task_signals.go:204] [ 1098: 1101] Signal 1098, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.888051 30210 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.888088 30210 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.888168 30210 task_signals.go:204] [ 1098: 1099] Signal 1098, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.888198 30210 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.888216 30210 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.888318 30210 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.888339 30210 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.888372 30210 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.888402 30210 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.888411 30210 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.889811 30210 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.889860 30210 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.889906 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.889959 30210 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0712 20:23:46.889987 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.890095 30210 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.890730 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.892114 30210 syscalls.go:262] [ 1103: 1103] Allocating stack with size of 8388608 bytes D0712 20:23:46.892224 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.893426 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.893549 30210 usertrap_amd64.go:106] [ 1103: 1103] Map a usertrap vma at 69000 D0712 20:23:46.893675 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 1 D0712 20:23:46.893700 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.893922 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.893945 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 2 D0712 20:23:46.893956 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.894480 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.894510 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 3 D0712 20:23:46.894526 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.899930 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.899956 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 4 D0712 20:23:46.899966 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.901241 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.901281 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 5 D0712 20:23:46.901291 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.901368 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.901376 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 6 D0712 20:23:46.901382 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.901714 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.901738 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 7 D0712 20:23:46.901745 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.901960 30210 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.901980 30210 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc001e1e090 8 D0712 20:23:46.901988 30210 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.902253 30210 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.902280 30210 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc001e1e090 9 D0712 20:23:46.902320 30210 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.902471 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.902514 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 10 D0712 20:23:46.902533 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.902644 30210 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.902668 30210 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc001e1e090 11 D0712 20:23:46.902679 30210 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.902725 30210 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.902738 30210 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc001e1e090 12 D0712 20:23:46.902748 30210 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.902785 30210 task_signals.go:470] [ 1103: 1106] Notified of signal 23 D0712 20:23:46.902821 30210 task_signals.go:220] [ 1103: 1106] Signal 23: delivering to handler D0712 20:23:46.903005 30210 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0712 20:23:46.903180 30210 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0712 20:23:46.910045 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.910075 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 13 D0712 20:23:46.910085 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.913593 30210 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0712 20:23:46.913652 30210 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0712 20:23:46.920457 30210 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.920503 30210 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc001e1e090 14 D0712 20:23:46.920518 30210 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.920595 30210 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.920629 30210 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.920652 30210 task_signals.go:204] [ 1103: 1106] Signal 1103, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.920671 30210 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.920676 30210 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.920680 30210 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.920645 30210 task_signals.go:204] [ 1103: 1105] Signal 1103, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.920747 30210 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.920817 30210 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.920827 30210 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.920694 30210 task_signals.go:204] [ 1103: 1107] Signal 1103, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.920870 30210 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.920881 30210 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.920892 30210 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.920671 30210 task_signals.go:204] [ 1103: 1104] Signal 1103, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.920926 30210 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.922199 30210 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.922250 30210 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.922271 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.922325 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.922340 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.922489 30210 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.923244 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.925034 30210 syscalls.go:262] [ 1108: 1108] Allocating stack with size of 8388608 bytes D0712 20:23:46.925148 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.926364 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.926422 30210 usertrap_amd64.go:106] [ 1108: 1108] Map a usertrap vma at 61000 D0712 20:23:46.926563 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 1 D0712 20:23:46.926616 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:46.927073 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.927099 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 2 D0712 20:23:46.927109 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:46.927810 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.927849 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 3 D0712 20:23:46.927863 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:46.934700 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.934755 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 4 D0712 20:23:46.934771 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:46.936116 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.936157 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 5 D0712 20:23:46.936174 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:46.937041 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.937073 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 6 D0712 20:23:46.937088 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:46.937340 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.937369 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 7 D0712 20:23:46.937379 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:46.937577 30210 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.937604 30210 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc00129dc50 8 D0712 20:23:46.937614 30210 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:46.937855 30210 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.937913 30210 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc00129dc50 9 D0712 20:23:46.937935 30210 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:46.938088 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.938130 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 10 D0712 20:23:46.938150 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:46.938260 30210 usertrap_amd64.go:212] [ 1108: 1110] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.938298 30210 usertrap_amd64.go:122] [ 1108: 1110] Allocate a new trap: 0xc00129dc50 11 D0712 20:23:46.938311 30210 usertrap_amd64.go:225] [ 1108: 1110] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:46.946441 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.946499 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 12 D0712 20:23:46.946523 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:46.949398 30210 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.949455 30210 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc00129dc50 13 D0712 20:23:46.949474 30210 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:46.949538 30210 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.949544 30210 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc00129dc50 14 D0712 20:23:46.949550 30210 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:46.949568 30210 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0712 20:23:46.949695 30210 task_signals.go:220] [ 1108: 1108] Signal 23: delivering to handler D0712 20:23:46.957778 30210 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.957814 30210 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc00129dc50 15 D0712 20:23:46.957828 30210 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 20:23:46.957886 30210 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.957922 30210 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.957948 30210 task_signals.go:204] [ 1108: 1112] Signal 1108, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.957947 30210 task_signals.go:204] [ 1108: 1111] Signal 1108, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.957967 30210 task_signals.go:204] [ 1108: 1110] Signal 1108, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.957981 30210 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.957994 30210 task_signals.go:204] [ 1108: 1109] Signal 1108, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.958006 30210 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.958011 30210 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.958021 30210 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.958042 30210 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.958049 30210 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.958060 30210 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.958078 30210 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.958084 30210 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.958097 30210 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.959507 30210 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.959536 30210 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.959875 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.959911 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.959972 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.960003 30210 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.960729 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.962574 30210 syscalls.go:262] [ 1113: 1113] Allocating stack with size of 8388608 bytes D0712 20:23:46.962691 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.963874 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.964047 30210 usertrap_amd64.go:106] [ 1113: 1113] Map a usertrap vma at 64000 D0712 20:23:46.964311 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 1 D0712 20:23:46.964406 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.965048 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.965072 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 2 D0712 20:23:46.965084 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.966478 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.966562 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 3 D0712 20:23:46.966601 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.975453 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.975491 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 4 D0712 20:23:46.975505 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.976487 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.976531 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 5 D0712 20:23:46.976549 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.976590 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.976610 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 6 D0712 20:23:46.976619 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.977883 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.977907 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 7 D0712 20:23:46.977915 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.978098 30210 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.978136 30210 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000a786f0 8 D0712 20:23:46.978152 30210 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.978382 30210 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.978415 30210 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000a786f0 9 D0712 20:23:46.978425 30210 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.978512 30210 usertrap_amd64.go:212] [ 1113: 1116] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.978532 30210 usertrap_amd64.go:122] [ 1113: 1116] Allocate a new trap: 0xc000a786f0 10 D0712 20:23:46.978543 30210 usertrap_amd64.go:225] [ 1113: 1116] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.985796 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.985836 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 11 D0712 20:23:46.985848 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.988647 30210 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.988679 30210 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000a786f0 12 D0712 20:23:46.988691 30210 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.988762 30210 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.988783 30210 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000a786f0 13 D0712 20:23:46.988789 30210 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.988814 30210 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0712 20:23:46.988884 30210 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0712 20:23:46.996479 30210 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.996521 30210 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000a786f0 14 D0712 20:23:46.996533 30210 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.996594 30210 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.996618 30210 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.996660 30210 task_signals.go:204] [ 1113: 1115] Signal 1113, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.996689 30210 task_signals.go:204] [ 1113: 1116] Signal 1113, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.996737 30210 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.996735 30210 task_signals.go:204] [ 1113: 1117] Signal 1113, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.996757 30210 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.996765 30210 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.996702 30210 task_signals.go:204] [ 1113: 1114] Signal 1113, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.996788 30210 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.996798 30210 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.996805 30210 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.996820 30210 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.996847 30210 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.996852 30210 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.996877 30210 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.998244 30210 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.998281 30210 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.998299 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.998360 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.998369 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.998655 30210 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.999315 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.001282 30210 syscalls.go:262] [ 1118: 1118] Allocating stack with size of 8388608 bytes D0712 20:23:47.001418 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.002792 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.002844 30210 usertrap_amd64.go:106] [ 1118: 1118] Map a usertrap vma at 64000 D0712 20:23:47.002927 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 1 D0712 20:23:47.002951 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:47.003432 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.003487 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 2 D0712 20:23:47.003505 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:47.004301 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.004337 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 3 D0712 20:23:47.004351 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:47.012233 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.012272 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 4 D0712 20:23:47.012286 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:47.013492 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.013522 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 5 D0712 20:23:47.013534 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:47.013592 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.013612 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 6 D0712 20:23:47.013620 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:47.013854 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.013875 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 7 D0712 20:23:47.013885 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:47.014104 30210 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.014138 30210 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc00129de30 8 D0712 20:23:47.014159 30210 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:47.014351 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.014367 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 9 D0712 20:23:47.014378 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:47.014409 30210 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.014428 30210 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc00129de30 10 D0712 20:23:47.014437 30210 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:47.023733 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.023792 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 11 D0712 20:23:47.023813 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:47.025021 30210 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.025058 30210 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc00129de30 12 D0712 20:23:47.026732 30210 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:47.026874 30210 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.026886 30210 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc00129de30 13 D0712 20:23:47.026899 30210 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:47.026932 30210 task_signals.go:470] [ 1118: 1118] Notified of signal 23 D0712 20:23:47.026994 30210 task_signals.go:220] [ 1118: 1118] Signal 23: delivering to handler D0712 20:23:47.036304 30210 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.036353 30210 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc00129de30 14 D0712 20:23:47.036368 30210 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:47.036452 30210 task_exit.go:204] [ 1118: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.036479 30210 task_exit.go:204] [ 1118: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.036533 30210 task_signals.go:204] [ 1118: 1121] Signal 1118, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.036554 30210 task_exit.go:204] [ 1118: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.036564 30210 task_exit.go:204] [ 1118: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.036532 30210 task_signals.go:204] [ 1118: 1120] Signal 1118, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.036555 30210 task_signals.go:204] [ 1118: 1122] Signal 1118, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.036571 30210 task_exit.go:204] [ 1118: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.036629 30210 task_signals.go:204] [ 1118: 1123] Signal 1118, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.036664 30210 task_exit.go:204] [ 1118: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.036689 30210 task_signals.go:204] [ 1118: 1119] Signal 1118, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.036723 30210 task_exit.go:204] [ 1118: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.036730 30210 task_exit.go:204] [ 1118: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.036743 30210 task_exit.go:204] [ 1118: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.036762 30210 task_exit.go:204] [ 1118: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.036771 30210 task_exit.go:204] [ 1118: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.036786 30210 task_exit.go:204] [ 1118: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.036797 30210 task_exit.go:204] [ 1118: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.036803 30210 task_exit.go:204] [ 1118: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.036817 30210 task_exit.go:204] [ 1118: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.038509 30210 task_exit.go:204] [ 1118: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.038552 30210 task_exit.go:204] [ 1118: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.038579 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.038645 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.038677 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.038778 30210 task_exit.go:204] [ 1118: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.038941 30210 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:47.039109 30210 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:47.039556 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.041491 30210 syscalls.go:262] [ 1124: 1124] Allocating stack with size of 8388608 bytes D0712 20:23:47.041626 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.043130 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.043191 30210 usertrap_amd64.go:106] [ 1124: 1124] Map a usertrap vma at 6a000 D0712 20:23:47.043311 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 1 D0712 20:23:47.043346 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:47.043817 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.043833 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 2 D0712 20:23:47.043843 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:47.044542 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.044569 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 3 D0712 20:23:47.044579 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:47.051099 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.051210 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 4 D0712 20:23:47.051293 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:47.053742 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.053790 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 5 D0712 20:23:47.053805 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:47.053878 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.053905 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 6 D0712 20:23:47.053912 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:47.054389 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.054410 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 7 D0712 20:23:47.054419 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:47.054744 30210 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.054786 30210 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc001e1e7b0 8 D0712 20:23:47.054808 30210 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:47.055253 30210 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.055308 30210 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc001e1e7b0 9 D0712 20:23:47.055321 30210 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:47.055335 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.055341 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 10 D0712 20:23:47.055349 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:47.055544 30210 usertrap_amd64.go:212] [ 1124: 1127] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:47.055576 30210 usertrap_amd64.go:122] [ 1124: 1127] Allocate a new trap: 0xc001e1e7b0 11 D0712 20:23:47.055595 30210 usertrap_amd64.go:225] [ 1124: 1127] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:47.064935 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.065024 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 12 D0712 20:23:47.065041 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:47.065972 30210 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.066006 30210 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc001e1e7b0 13 D0712 20:23:47.066020 30210 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:47.067960 30210 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.068019 30210 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc001e1e7b0 14 D0712 20:23:47.068040 30210 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:47.068098 30210 task_signals.go:470] [ 1124: 1124] Notified of signal 23 D0712 20:23:47.068212 30210 task_signals.go:220] [ 1124: 1124] Signal 23: delivering to handler D0712 20:23:47.077314 30210 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.077358 30210 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc001e1e7b0 15 D0712 20:23:47.077376 30210 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0712 20:23:47.077452 30210 task_exit.go:204] [ 1124: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.077493 30210 task_exit.go:204] [ 1124: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.077519 30210 task_signals.go:204] [ 1124: 1127] Signal 1124, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.077528 30210 task_signals.go:204] [ 1124: 1128] Signal 1124, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.077537 30210 task_signals.go:204] [ 1124: 1125] Signal 1124, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.077547 30210 task_exit.go:204] [ 1124: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.077519 30210 task_signals.go:204] [ 1124: 1126] Signal 1124, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.077557 30210 task_exit.go:204] [ 1124: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.077571 30210 task_exit.go:204] [ 1124: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.077579 30210 task_exit.go:204] [ 1124: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.077593 30210 task_exit.go:204] [ 1124: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.077602 30210 task_exit.go:204] [ 1124: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.077610 30210 task_exit.go:204] [ 1124: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.077641 30210 task_exit.go:204] [ 1124: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.078145 30210 task_exit.go:204] [ 1124: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.078175 30210 task_exit.go:204] [ 1124: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.079803 30210 task_exit.go:204] [ 1124: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.079839 30210 task_exit.go:204] [ 1124: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.079869 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.079915 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.079940 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.080132 30210 task_exit.go:204] [ 1124: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.080702 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.082240 30210 syscalls.go:262] [ 1129: 1129] Allocating stack with size of 8388608 bytes D0712 20:23:47.082337 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.083597 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.083629 30210 usertrap_amd64.go:106] [ 1129: 1129] Map a usertrap vma at 64000 D0712 20:23:47.083716 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 1 D0712 20:23:47.083737 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:47.084098 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.084115 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 2 D0712 20:23:47.084126 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:47.085094 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.085122 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 3 D0712 20:23:47.085133 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:47.091800 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.091834 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 4 D0712 20:23:47.091844 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:47.093156 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.093187 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 5 D0712 20:23:47.093200 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:47.093268 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.093278 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 6 D0712 20:23:47.093288 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:47.093943 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.093961 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 7 D0712 20:23:47.093974 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:47.094240 30210 usertrap_amd64.go:212] [ 1129: 1130] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.094290 30210 usertrap_amd64.go:122] [ 1129: 1130] Allocate a new trap: 0xc002690120 8 D0712 20:23:47.094311 30210 usertrap_amd64.go:225] [ 1129: 1130] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:47.094614 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.094645 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 9 D0712 20:23:47.094657 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:47.094674 30210 usertrap_amd64.go:212] [ 1129: 1130] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.094681 30210 usertrap_amd64.go:122] [ 1129: 1130] Allocate a new trap: 0xc002690120 10 D0712 20:23:47.094689 30210 usertrap_amd64.go:225] [ 1129: 1130] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:47.103322 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.103374 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 11 D0712 20:23:47.103389 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:47.106386 30210 usertrap_amd64.go:212] [ 1129: 1130] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.106440 30210 usertrap_amd64.go:122] [ 1129: 1130] Allocate a new trap: 0xc002690120 12 D0712 20:23:47.106458 30210 usertrap_amd64.go:225] [ 1129: 1130] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:47.106488 30210 usertrap_amd64.go:212] [ 1129: 1130] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.106496 30210 usertrap_amd64.go:122] [ 1129: 1130] Allocate a new trap: 0xc002690120 13 D0712 20:23:47.106505 30210 usertrap_amd64.go:225] [ 1129: 1130] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:47.106542 30210 task_signals.go:470] [ 1129: 1129] Notified of signal 23 D0712 20:23:47.106639 30210 task_signals.go:220] [ 1129: 1129] Signal 23: delivering to handler D0712 20:23:47.115200 30210 usertrap_amd64.go:212] [ 1129: 1129] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.115241 30210 usertrap_amd64.go:122] [ 1129: 1129] Allocate a new trap: 0xc002690120 14 D0712 20:23:47.115256 30210 usertrap_amd64.go:225] [ 1129: 1129] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:47.115328 30210 task_exit.go:204] [ 1129: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.115357 30210 task_exit.go:204] [ 1129: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.115382 30210 task_signals.go:204] [ 1129: 1132] Signal 1129, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.115382 30210 task_signals.go:204] [ 1129: 1131] Signal 1129, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.115409 30210 task_exit.go:204] [ 1129: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.115443 30210 task_signals.go:204] [ 1129: 1133] Signal 1129, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.115477 30210 task_exit.go:204] [ 1129: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.115488 30210 task_exit.go:204] [ 1129: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.115507 30210 task_exit.go:204] [ 1129: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.115523 30210 task_exit.go:204] [ 1129: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.115528 30210 task_exit.go:204] [ 1129: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.115545 30210 task_signals.go:204] [ 1129: 1130] Signal 1129, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.115571 30210 task_exit.go:204] [ 1129: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.115578 30210 task_exit.go:204] [ 1129: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.115582 30210 task_exit.go:204] [ 1129: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.115591 30210 task_exit.go:204] [ 1129: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.117117 30210 task_exit.go:204] [ 1129: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.117154 30210 task_exit.go:204] [ 1129: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.117169 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.117200 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.117216 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.117414 30210 task_exit.go:204] [ 1129: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.118125 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.119617 30210 syscalls.go:262] [ 1134: 1134] Allocating stack with size of 8388608 bytes D0712 20:23:47.119721 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.121243 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.121283 30210 usertrap_amd64.go:106] [ 1134: 1134] Map a usertrap vma at 66000 D0712 20:23:47.121343 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 1 D0712 20:23:47.121359 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:47.122141 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.122177 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 2 D0712 20:23:47.122189 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:47.122886 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.122929 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 3 D0712 20:23:47.122945 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:47.129715 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.129754 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 4 D0712 20:23:47.129771 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:47.131253 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.131271 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 5 D0712 20:23:47.131284 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:47.131355 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.131373 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 6 D0712 20:23:47.131382 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:47.131657 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.131672 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 7 D0712 20:23:47.131678 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:47.131833 30210 usertrap_amd64.go:212] [ 1134: 1135] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.131863 30210 usertrap_amd64.go:122] [ 1134: 1135] Allocate a new trap: 0xc002690210 8 D0712 20:23:47.131875 30210 usertrap_amd64.go:225] [ 1134: 1135] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:47.132153 30210 usertrap_amd64.go:212] [ 1134: 1135] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.132176 30210 usertrap_amd64.go:122] [ 1134: 1135] Allocate a new trap: 0xc002690210 9 D0712 20:23:47.132187 30210 usertrap_amd64.go:225] [ 1134: 1135] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:47.132201 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.132208 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 10 D0712 20:23:47.132215 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:47.140912 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.141022 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 11 D0712 20:23:47.141038 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:47.143644 30210 usertrap_amd64.go:212] [ 1134: 1135] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.143676 30210 usertrap_amd64.go:122] [ 1134: 1135] Allocate a new trap: 0xc002690210 12 D0712 20:23:47.143689 30210 usertrap_amd64.go:225] [ 1134: 1135] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:47.143771 30210 usertrap_amd64.go:212] [ 1134: 1135] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.143797 30210 usertrap_amd64.go:122] [ 1134: 1135] Allocate a new trap: 0xc002690210 13 D0712 20:23:47.143806 30210 usertrap_amd64.go:225] [ 1134: 1135] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:47.143841 30210 task_signals.go:470] [ 1134: 1134] Notified of signal 23 D0712 20:23:47.143894 30210 task_signals.go:220] [ 1134: 1134] Signal 23: delivering to handler D0712 20:23:47.153095 30210 usertrap_amd64.go:212] [ 1134: 1134] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.153164 30210 usertrap_amd64.go:122] [ 1134: 1134] Allocate a new trap: 0xc002690210 14 D0712 20:23:47.153182 30210 usertrap_amd64.go:225] [ 1134: 1134] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:47.153231 30210 task_exit.go:204] [ 1134: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.153258 30210 task_exit.go:204] [ 1134: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.153276 30210 task_signals.go:204] [ 1134: 1138] Signal 1134, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.153300 30210 task_exit.go:204] [ 1134: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.153296 30210 task_signals.go:204] [ 1134: 1136] Signal 1134, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.153306 30210 task_exit.go:204] [ 1134: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.153319 30210 task_exit.go:204] [ 1134: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.153278 30210 task_signals.go:204] [ 1134: 1135] Signal 1134, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.153345 30210 task_exit.go:204] [ 1134: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.153355 30210 task_signals.go:204] [ 1134: 1137] Signal 1134, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.153379 30210 task_exit.go:204] [ 1134: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.153386 30210 task_exit.go:204] [ 1134: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.153399 30210 task_exit.go:204] [ 1134: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.153406 30210 task_exit.go:204] [ 1134: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.153412 30210 task_exit.go:204] [ 1134: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.153424 30210 task_exit.go:204] [ 1134: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.154917 30210 task_exit.go:204] [ 1134: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.154957 30210 task_exit.go:204] [ 1134: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.154984 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.155037 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.155055 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.155150 30210 task_exit.go:204] [ 1134: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.155824 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.157430 30210 syscalls.go:262] [ 1139: 1139] Allocating stack with size of 8388608 bytes D0712 20:23:47.157536 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.160396 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.160440 30210 usertrap_amd64.go:106] [ 1139: 1139] Map a usertrap vma at 66000 D0712 20:23:47.160548 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 1 D0712 20:23:47.160586 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:47.161052 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.161083 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 2 D0712 20:23:47.161095 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:47.161615 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.161643 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 3 D0712 20:23:47.161657 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:47.170278 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.170341 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 4 D0712 20:23:47.170359 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:47.171685 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.171713 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 5 D0712 20:23:47.171724 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:47.171767 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.171776 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 6 D0712 20:23:47.171785 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:47.172154 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.172173 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 7 D0712 20:23:47.172181 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:47.172357 30210 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.172379 30210 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0005e3800 8 D0712 20:23:47.172388 30210 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:47.172647 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.172676 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 9 D0712 20:23:47.172689 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:47.172706 30210 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.172715 30210 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0005e3800 10 D0712 20:23:47.172724 30210 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:47.180350 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.180384 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 11 D0712 20:23:47.180400 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:47.185250 30210 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.185284 30210 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0005e3800 12 D0712 20:23:47.185300 30210 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:47.185512 30210 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.185547 30210 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0005e3800 13 D0712 20:23:47.185561 30210 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:47.185836 30210 task_signals.go:470] [ 1139: 1139] Notified of signal 23 D0712 20:23:47.185915 30210 task_signals.go:220] [ 1139: 1139] Signal 23: delivering to handler D0712 20:23:47.192699 30210 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.192748 30210 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0005e3800 14 D0712 20:23:47.192764 30210 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:47.192837 30210 task_exit.go:204] [ 1139: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.192873 30210 task_exit.go:204] [ 1139: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.192906 30210 task_signals.go:204] [ 1139: 1142] Signal 1139, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.192934 30210 task_exit.go:204] [ 1139: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.192934 30210 task_signals.go:204] [ 1139: 1140] Signal 1139, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.192985 30210 task_exit.go:204] [ 1139: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.192994 30210 task_exit.go:204] [ 1139: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.193015 30210 task_exit.go:204] [ 1139: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.192901 30210 task_signals.go:204] [ 1139: 1141] Signal 1139, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.193048 30210 task_exit.go:204] [ 1139: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.193055 30210 task_exit.go:204] [ 1139: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.193074 30210 task_signals.go:204] [ 1139: 1143] Signal 1139, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.193085 30210 task_exit.go:204] [ 1139: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.193094 30210 task_exit.go:204] [ 1139: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.193099 30210 task_exit.go:204] [ 1139: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.193115 30210 task_exit.go:204] [ 1139: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.195143 30210 task_exit.go:204] [ 1139: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.195214 30210 task_exit.go:204] [ 1139: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.195238 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.195355 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.195390 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.195633 30210 task_exit.go:204] [ 1139: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.197717 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.199498 30210 syscalls.go:262] [ 1144: 1144] Allocating stack with size of 8388608 bytes D0712 20:23:47.199613 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.202565 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.202636 30210 usertrap_amd64.go:106] [ 1144: 1144] Map a usertrap vma at 64000 D0712 20:23:47.202755 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 1 D0712 20:23:47.202796 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:47.203962 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.203988 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 2 D0712 20:23:47.204002 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:47.204622 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.204647 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 3 D0712 20:23:47.204658 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:47.211653 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.211702 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 4 D0712 20:23:47.211718 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:47.213219 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.213258 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 5 D0712 20:23:47.213272 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:47.213397 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.213412 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 6 D0712 20:23:47.213420 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:47.214124 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.214164 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 7 D0712 20:23:47.214178 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:47.215095 30210 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.215118 30210 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0005e3a10 8 D0712 20:23:47.215131 30210 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:47.215349 30210 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.215386 30210 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0005e3a10 9 D0712 20:23:47.215397 30210 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:47.215766 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.215798 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 10 D0712 20:23:47.215811 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:47.224574 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.224623 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 11 D0712 20:23:47.224637 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:47.227710 30210 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.227749 30210 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0005e3a10 12 D0712 20:23:47.227766 30210 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:47.227871 30210 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.227898 30210 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0005e3a10 13 D0712 20:23:47.227911 30210 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:47.227983 30210 task_signals.go:470] [ 1144: 1144] Notified of signal 23 D0712 20:23:47.228023 30210 task_signals.go:220] [ 1144: 1144] Signal 23: delivering to handler I0712 20:23:47.237280 30210 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0712 20:23:47.237393 30210 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.237460 30210 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0005e3a10 14 D0712 20:23:47.237480 30210 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:47.237640 30210 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.237690 30210 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.237727 30210 task_signals.go:204] [ 1144: 1145] Signal 1144, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.237751 30210 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.237761 30210 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.237768 30210 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.237790 30210 task_signals.go:204] [ 1144: 1146] Signal 1144, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.237814 30210 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.237825 30210 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.237832 30210 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.237855 30210 task_signals.go:204] [ 1144: 1147] Signal 1144, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.237864 30210 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.237877 30210 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.237883 30210 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.237899 30210 task_signals.go:204] [ 1144: 1148] Signal 1144, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.237909 30210 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.239437 30210 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.239468 30210 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.239484 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.239565 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.239578 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.239789 30210 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.240575 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.242509 30210 syscalls.go:262] [ 1149: 1149] Allocating stack with size of 8388608 bytes D0712 20:23:47.242602 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.244466 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.244530 30210 usertrap_amd64.go:106] [ 1149: 1149] Map a usertrap vma at 67000 D0712 20:23:47.244655 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 1 D0712 20:23:47.244688 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:47.245408 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.245439 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 2 D0712 20:23:47.245450 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:47.246022 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.246050 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 3 D0712 20:23:47.246057 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:47.253089 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.253146 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 4 D0712 20:23:47.253162 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:47.254411 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.254451 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 5 D0712 20:23:47.254469 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:47.254537 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.254547 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 6 D0712 20:23:47.254557 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:47.254792 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.254817 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 7 D0712 20:23:47.254827 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:47.255019 30210 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.255036 30210 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0005e3aa0 8 D0712 20:23:47.255047 30210 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:47.255243 30210 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.255289 30210 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0005e3aa0 9 D0712 20:23:47.255306 30210 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:47.255454 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.255488 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 10 D0712 20:23:47.255500 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:47.264731 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.264769 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 11 D0712 20:23:47.264783 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:47.267841 30210 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.267865 30210 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0005e3aa0 12 D0712 20:23:47.267881 30210 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:47.267906 30210 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.267914 30210 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0005e3aa0 13 D0712 20:23:47.267921 30210 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:47.267942 30210 task_signals.go:470] [ 1149: 1149] Notified of signal 23 D0712 20:23:47.268088 30210 task_signals.go:220] [ 1149: 1149] Signal 23: delivering to handler D0712 20:23:47.277056 30210 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.277123 30210 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0005e3aa0 14 D0712 20:23:47.277141 30210 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:47.277243 30210 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.277277 30210 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.277304 30210 task_signals.go:204] [ 1149: 1152] Signal 1149, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.277325 30210 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.277330 30210 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.277334 30210 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.277298 30210 task_signals.go:204] [ 1149: 1151] Signal 1149, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.277349 30210 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.277356 30210 task_signals.go:204] [ 1149: 1150] Signal 1149, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.277364 30210 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.277396 30210 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.277413 30210 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.277489 30210 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.277514 30210 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.277551 30210 task_signals.go:204] [ 1149: 1153] Signal 1149, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.277580 30210 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.279292 30210 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.279337 30210 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.279356 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.280403 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.280446 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.280598 30210 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.281264 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.283017 30210 syscalls.go:262] [ 1154: 1154] Allocating stack with size of 8388608 bytes D0712 20:23:47.283134 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.284768 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.284822 30210 usertrap_amd64.go:106] [ 1154: 1154] Map a usertrap vma at 62000 D0712 20:23:47.284913 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 1 D0712 20:23:47.285006 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:47.285673 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.285727 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 2 D0712 20:23:47.285741 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:47.286805 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.286838 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 3 D0712 20:23:47.286851 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:47.295679 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.295748 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 4 D0712 20:23:47.295765 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:47.297269 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.297308 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 5 D0712 20:23:47.297320 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:47.297372 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.297380 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 6 D0712 20:23:47.297389 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:47.297865 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.297891 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 7 D0712 20:23:47.297901 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:47.298129 30210 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.298178 30210 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001e1efc0 8 D0712 20:23:47.298195 30210 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:47.298563 30210 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.298611 30210 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001e1efc0 9 D0712 20:23:47.298628 30210 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:47.298714 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.298739 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 10 D0712 20:23:47.298757 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:47.299538 30210 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.299575 30210 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001e1efc0 11 D0712 20:23:47.299590 30210 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:47.299701 30210 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.299723 30210 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001e1efc0 12 D0712 20:23:47.299734 30210 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:47.299758 30210 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0712 20:23:47.299872 30210 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0712 20:23:47.309100 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.309155 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 13 D0712 20:23:47.309173 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:47.310385 30210 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0712 20:23:47.312054 30210 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0712 20:23:47.314126 30210 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0712 20:23:47.314245 30210 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0712 20:23:47.323791 30210 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.323835 30210 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001e1efc0 14 D0712 20:23:47.323851 30210 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:47.323910 30210 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.323933 30210 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.323963 30210 task_signals.go:204] [ 1154: 1155] Signal 1154, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.323990 30210 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.323997 30210 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.324002 30210 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.324018 30210 task_signals.go:204] [ 1154: 1156] Signal 1154, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.324027 30210 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.324033 30210 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.324038 30210 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.324055 30210 task_signals.go:204] [ 1154: 1157] Signal 1154, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.324063 30210 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.324068 30210 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.324074 30210 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.324091 30210 task_signals.go:204] [ 1154: 1158] Signal 1154, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.324107 30210 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.326061 30210 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.326095 30210 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.326111 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.326155 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.326186 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.326346 30210 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.327508 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.329257 30210 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0712 20:23:47.329372 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.330826 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.330930 30210 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 68000 D0712 20:23:47.331292 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 1 D0712 20:23:47.331345 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:47.333357 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.333427 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 2 D0712 20:23:47.333446 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:47.335295 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.335329 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 3 D0712 20:23:47.335346 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:47.342493 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.342538 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 4 D0712 20:23:47.342551 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:47.344024 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.344075 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 5 D0712 20:23:47.344092 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:47.344201 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.344223 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 6 D0712 20:23:47.344231 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:47.344531 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.344560 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 7 D0712 20:23:47.344572 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:47.344744 30210 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.344779 30210 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0026906f0 8 D0712 20:23:47.344790 30210 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:47.344936 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.345028 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 9 D0712 20:23:47.345042 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:47.345216 30210 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.345307 30210 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0026906f0 10 D0712 20:23:47.345325 30210 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:47.353876 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.353920 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 11 D0712 20:23:47.353935 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:47.358388 30210 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.358427 30210 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0026906f0 12 D0712 20:23:47.358444 30210 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:47.358494 30210 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.358510 30210 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0026906f0 13 D0712 20:23:47.358518 30210 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:47.358536 30210 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0712 20:23:47.358751 30210 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0712 20:23:47.370173 30210 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.370238 30210 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0026906f0 14 D0712 20:23:47.370256 30210 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:47.370334 30210 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.370373 30210 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.370410 30210 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.370439 30210 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.370450 30210 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.370431 30210 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.370427 30210 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.370455 30210 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.370541 30210 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.370544 30210 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.370568 30210 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.370594 30210 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.370614 30210 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.370663 30210 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.370763 30210 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.370835 30210 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.372546 30210 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.372639 30210 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.372664 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.372744 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.372769 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.373029 30210 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.373587 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.375338 30210 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0712 20:23:47.375454 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.379014 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.379065 30210 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 68000 D0712 20:23:47.379140 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 1 D0712 20:23:47.379183 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:47.379377 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.379401 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 2 D0712 20:23:47.379413 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:47.380515 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.380549 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 3 D0712 20:23:47.380559 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:47.392401 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.392449 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 4 D0712 20:23:47.392466 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:47.393783 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.393812 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 5 D0712 20:23:47.393822 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:47.393876 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.393885 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 6 D0712 20:23:47.393894 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:47.394249 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.394269 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 7 D0712 20:23:47.394278 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:47.394492 30210 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.394521 30210 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc002690840 8 D0712 20:23:47.394532 30210 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:47.394613 30210 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.394631 30210 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc002690840 9 D0712 20:23:47.394639 30210 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:47.394847 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.394891 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 10 D0712 20:23:47.394906 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:47.406458 30210 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.406555 30210 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc002690840 11 D0712 20:23:47.406578 30210 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:47.406613 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.406619 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 12 D0712 20:23:47.406626 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:47.406682 30210 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.406719 30210 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc002690840 13 D0712 20:23:47.406729 30210 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:47.406783 30210 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0712 20:23:47.406857 30210 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0712 20:23:47.418052 30210 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0712 20:23:47.419361 30210 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0712 20:23:47.419625 30210 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0712 20:23:47.419725 30210 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0712 20:23:47.420247 30210 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.420380 30210 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc002690840 14 D0712 20:23:47.420407 30210 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:47.420538 30210 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.420618 30210 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.420687 30210 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.420728 30210 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.420727 30210 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.420684 30210 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.420761 30210 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.420836 30210 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.420883 30210 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.420896 30210 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.420906 30210 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.420912 30210 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.421003 30210 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.421014 30210 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.421019 30210 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.421029 30210 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.422570 30210 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.422697 30210 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.422732 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.422838 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.422859 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.422986 30210 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.423712 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.425294 30210 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0712 20:23:47.425420 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.429503 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.429683 30210 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 60000 D0712 20:23:47.429784 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 1 D0712 20:23:47.429820 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:47.430228 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.430304 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 2 D0712 20:23:47.430330 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:47.432030 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.432100 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 3 D0712 20:23:47.432130 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:47.437741 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.437778 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 4 D0712 20:23:47.437794 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:47.438754 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.438770 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 5 D0712 20:23:47.438783 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:47.438819 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.438828 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 6 D0712 20:23:47.438837 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:47.439020 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.439048 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 7 D0712 20:23:47.439057 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:47.439325 30210 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.439339 30210 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0003fe0f0 8 D0712 20:23:47.439348 30210 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:47.439453 30210 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.439468 30210 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0003fe0f0 9 D0712 20:23:47.439474 30210 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:47.439542 30210 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.439557 30210 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0003fe0f0 10 D0712 20:23:47.439588 30210 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 60320 ([184 39 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:47.439673 30210 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.439683 30210 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0003fe0f0 11 D0712 20:23:47.439692 30210 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 60370 ([184 234 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:47.439714 30210 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0712 20:23:47.439745 30210 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0712 20:23:47.439926 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.439938 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 12 D0712 20:23:47.439945 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 603c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:47.449278 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.449312 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 13 D0712 20:23:47.449324 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:47.451171 30210 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0712 20:23:47.451977 30210 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0712 20:23:47.452086 30210 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0712 20:23:47.452103 30210 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0712 20:23:47.461080 30210 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.461127 30210 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0003fe0f0 14 D0712 20:23:47.461142 30210 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:47.461215 30210 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.461246 30210 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.461253 30210 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.461289 30210 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.461289 30210 task_signals.go:204] [ 1169: 1174] Signal 1169, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.461302 30210 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.461309 30210 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.461269 30210 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.461333 30210 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.461332 30210 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.461344 30210 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.461357 30210 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.461363 30210 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.461375 30210 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.461383 30210 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.461388 30210 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.461397 30210 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.461404 30210 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.461408 30210 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.461428 30210 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.462646 30210 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.462669 30210 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.462685 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.462715 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.462731 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.462822 30210 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.463401 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.464843 30210 syscalls.go:262] [ 1175: 1175] Allocating stack with size of 8388608 bytes D0712 20:23:47.465055 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.467085 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.467132 30210 usertrap_amd64.go:106] [ 1175: 1175] Map a usertrap vma at 68000 D0712 20:23:47.467244 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 1 D0712 20:23:47.467317 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:47.467767 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.467789 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 2 D0712 20:23:47.467805 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:47.468345 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.468368 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 3 D0712 20:23:47.468376 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:47.473673 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.473709 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 4 D0712 20:23:47.473724 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:47.474827 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.474878 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 5 D0712 20:23:47.474891 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:47.474936 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.474944 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 6 D0712 20:23:47.474951 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:47.475148 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.475173 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 7 D0712 20:23:47.475180 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:47.475328 30210 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.475352 30210 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0007de030 8 D0712 20:23:47.475361 30210 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:47.475511 30210 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.475534 30210 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0007de030 9 D0712 20:23:47.475542 30210 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:47.475605 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.475633 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 10 D0712 20:23:47.475641 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:47.485860 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.485919 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 11 D0712 20:23:47.485934 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:47.488676 30210 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.488742 30210 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0007de030 12 D0712 20:23:47.488763 30210 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:47.488877 30210 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.488922 30210 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0007de030 13 D0712 20:23:47.488980 30210 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:47.489004 30210 task_signals.go:470] [ 1175: 1175] Notified of signal 23 D0712 20:23:47.489093 30210 task_signals.go:220] [ 1175: 1175] Signal 23: delivering to handler D0712 20:23:47.498877 30210 sys_signal.go:495] [ 1175: 1175] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0712 20:23:47.499096 30210 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.499119 30210 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0007de030 14 D0712 20:23:47.499137 30210 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:47.499227 30210 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.499254 30210 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.499289 30210 task_signals.go:204] [ 1175: 1176] Signal 1175, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.499307 30210 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.499315 30210 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.499320 30210 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.499347 30210 task_signals.go:204] [ 1175: 1177] Signal 1175, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.499369 30210 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.499376 30210 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.499381 30210 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.499406 30210 task_signals.go:204] [ 1175: 1178] Signal 1175, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.499415 30210 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.499422 30210 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.499428 30210 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.499444 30210 task_signals.go:204] [ 1175: 1179] Signal 1175, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.499468 30210 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.501115 30210 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.501155 30210 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.501172 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.501221 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.501231 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.501389 30210 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.501983 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.503517 30210 syscalls.go:262] [ 1180: 1180] Allocating stack with size of 8388608 bytes D0712 20:23:47.503669 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.506284 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.506382 30210 usertrap_amd64.go:106] [ 1180: 1180] Map a usertrap vma at 61000 D0712 20:23:47.506492 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 1 D0712 20:23:47.506535 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:47.506995 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.507025 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 2 D0712 20:23:47.507035 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:47.507741 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.507769 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 3 D0712 20:23:47.507783 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:47.514697 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.514743 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 4 D0712 20:23:47.514758 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:47.516005 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.516159 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 5 D0712 20:23:47.516200 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:47.516428 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.516468 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 6 D0712 20:23:47.516483 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:47.517147 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.517178 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 7 D0712 20:23:47.517189 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:47.517427 30210 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.517447 30210 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000a78270 8 D0712 20:23:47.517456 30210 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:47.517727 30210 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.517868 30210 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000a78270 9 D0712 20:23:47.517995 30210 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:47.518052 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.518064 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 10 D0712 20:23:47.518096 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:47.526204 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.526242 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 11 D0712 20:23:47.526252 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:47.528765 30210 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.528817 30210 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000a78270 12 D0712 20:23:47.528837 30210 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:47.528897 30210 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.528916 30210 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000a78270 13 D0712 20:23:47.528931 30210 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:47.529010 30210 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0712 20:23:47.529099 30210 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0712 20:23:47.536911 30210 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.536978 30210 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000a78270 14 D0712 20:23:47.536994 30210 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:47.537056 30210 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.537081 30210 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.537111 30210 task_signals.go:204] [ 1180: 1183] Signal 1180, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.537134 30210 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.537168 30210 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.537176 30210 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.537100 30210 task_signals.go:204] [ 1180: 1182] Signal 1180, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.537195 30210 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.537202 30210 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.537205 30210 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.537137 30210 task_signals.go:204] [ 1180: 1181] Signal 1180, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.537216 30210 task_signals.go:204] [ 1180: 1184] Signal 1180, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.537221 30210 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.537241 30210 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.537248 30210 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.537259 30210 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.538639 30210 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.538672 30210 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.538690 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.538724 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.538748 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.538810 30210 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.539367 30210 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.540785 30210 syscalls.go:262] [ 1185: 1185] Allocating stack with size of 8388608 bytes D0712 20:23:47.540911 30210 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.542435 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.542498 30210 usertrap_amd64.go:106] [ 1185: 1185] Map a usertrap vma at 67000 D0712 20:23:47.542612 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 1 D0712 20:23:47.542650 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:47.543004 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.543026 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 2 D0712 20:23:47.543036 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:47.543533 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.543559 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 3 D0712 20:23:47.543570 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:47.549393 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.549446 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 4 D0712 20:23:47.549468 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:47.550698 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.550718 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 5 D0712 20:23:47.550732 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:47.550854 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.550874 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 6 D0712 20:23:47.550882 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:47.551312 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.551332 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 7 D0712 20:23:47.551341 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:47.551485 30210 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.551506 30210 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc002690270 8 D0712 20:23:47.551515 30210 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:47.551713 30210 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.551737 30210 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc002690270 9 D0712 20:23:47.551748 30210 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:47.551783 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.551798 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 10 D0712 20:23:47.551805 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:47.560626 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.560656 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 11 D0712 20:23:47.560685 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:47.564418 30210 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.564513 30210 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc002690270 12 D0712 20:23:47.564544 30210 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:47.564588 30210 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.564598 30210 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc002690270 13 D0712 20:23:47.564606 30210 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:47.564622 30210 task_signals.go:470] [ 1185: 1185] Notified of signal 23 D0712 20:23:47.564700 30210 task_signals.go:220] [ 1185: 1185] Signal 23: delivering to handler D0712 20:23:47.570967 30210 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.570997 30210 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc002690270 14 D0712 20:23:47.571009 30210 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:47.571068 30210 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.571087 30210 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.571114 30210 task_signals.go:204] [ 1185: 1189] Signal 1185, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.571129 30210 task_signals.go:204] [ 1185: 1188] Signal 1185, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.571137 30210 task_signals.go:204] [ 1185: 1186] Signal 1185, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.571108 30210 task_signals.go:204] [ 1185: 1187] Signal 1185, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.571136 30210 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.571165 30210 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.571173 30210 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.571190 30210 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.571207 30210 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.571214 30210 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.571224 30210 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.571237 30210 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.571241 30210 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.571248 30210 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.572491 30210 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.572521 30210 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.572537 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.573371 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.573452 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.573598 30210 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.574989 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.576188 30210 syscalls.go:262] [ 1190: 1190] Allocating stack with size of 8388608 bytes D0712 20:23:47.576296 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.577197 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.577233 30210 usertrap_amd64.go:106] [ 1190: 1190] Map a usertrap vma at 69000 D0712 20:23:47.577306 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 1 D0712 20:23:47.577325 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:47.577523 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.577536 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 2 D0712 20:23:47.577542 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:47.577853 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.577877 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 3 D0712 20:23:47.577890 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:47.583459 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.583492 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 4 D0712 20:23:47.583509 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:47.585192 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.585251 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 5 D0712 20:23:47.585271 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:47.585439 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.585463 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 6 D0712 20:23:47.585473 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:47.586004 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.586034 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 7 D0712 20:23:47.586042 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:47.586301 30210 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.586485 30210 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0003fe8a0 8 D0712 20:23:47.586510 30210 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:47.586759 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.586788 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 9 D0712 20:23:47.586799 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:47.586812 30210 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.586832 30210 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0003fe8a0 10 D0712 20:23:47.586847 30210 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:47.587395 30210 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.587410 30210 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0003fe8a0 11 D0712 20:23:47.587426 30210 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:47.587550 30210 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.587574 30210 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0003fe8a0 12 D0712 20:23:47.587583 30210 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:47.587633 30210 task_signals.go:470] [ 1190: 1190] Notified of signal 23 D0712 20:23:47.587729 30210 task_signals.go:220] [ 1190: 1190] Signal 23: delivering to handler D0712 20:23:47.595284 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.595315 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 13 D0712 20:23:47.595325 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:47.599001 30210 task_signals.go:470] [ 1190: 1190] Notified of signal 23 D0712 20:23:47.599082 30210 task_signals.go:220] [ 1190: 1190] Signal 23: delivering to handler D0712 20:23:47.606236 30210 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.606274 30210 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0003fe8a0 14 D0712 20:23:47.606290 30210 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:47.606334 30210 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.606357 30210 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.606380 30210 task_signals.go:204] [ 1190: 1194] Signal 1190, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.606408 30210 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.606417 30210 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.606432 30210 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.606377 30210 task_signals.go:204] [ 1190: 1191] Signal 1190, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.606458 30210 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.606467 30210 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.606474 30210 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.606384 30210 task_signals.go:204] [ 1190: 1193] Signal 1190, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.606387 30210 task_signals.go:204] [ 1190: 1192] Signal 1190, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.606486 30210 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.606493 30210 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.606525 30210 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.606542 30210 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.607879 30210 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.607894 30210 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.607908 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.607976 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.607986 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.608284 30210 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.608834 30210 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.610190 30210 syscalls.go:262] [ 1195: 1195] Allocating stack with size of 8388608 bytes D0712 20:23:47.610293 30210 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.612684 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.612734 30210 usertrap_amd64.go:106] [ 1195: 1195] Map a usertrap vma at 67000 D0712 20:23:47.612849 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 1 D0712 20:23:47.612929 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:47.613562 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.613598 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 2 D0712 20:23:47.613615 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:47.614314 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.614409 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 3 D0712 20:23:47.614511 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:47.621336 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.621370 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 4 D0712 20:23:47.621387 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:47.623115 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.623161 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 5 D0712 20:23:47.623175 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:47.623231 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.623239 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 6 D0712 20:23:47.623247 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:47.623986 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.624019 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 7 D0712 20:23:47.624030 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:47.624273 30210 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.624307 30210 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc000a78600 8 D0712 20:23:47.624320 30210 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:47.624638 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.624682 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 9 D0712 20:23:47.624694 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:47.624726 30210 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.624750 30210 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc000a78600 10 D0712 20:23:47.624761 30210 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:47.632333 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.632353 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 11 D0712 20:23:47.632366 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:47.636242 30210 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.636430 30210 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc000a78600 12 D0712 20:23:47.636464 30210 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:47.636529 30210 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.636538 30210 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc000a78600 13 D0712 20:23:47.636547 30210 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:47.636563 30210 task_signals.go:470] [ 1195: 1195] Notified of signal 23 D0712 20:23:47.636631 30210 task_signals.go:220] [ 1195: 1195] Signal 23: delivering to handler D0712 20:23:47.647520 30210 task_signals.go:470] [ 1195: 1195] Notified of signal 23 D0712 20:23:47.648020 30210 task_signals.go:220] [ 1195: 1195] Signal 23: delivering to handler D0712 20:23:47.648579 30210 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.648607 30210 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc000a78600 14 D0712 20:23:47.648623 30210 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:47.648701 30210 task_exit.go:204] [ 1195: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.648734 30210 task_exit.go:204] [ 1195: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.648737 30210 task_signals.go:204] [ 1195: 1197] Signal 1195, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.648758 30210 task_exit.go:204] [ 1195: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.648780 30210 task_exit.go:204] [ 1195: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.648786 30210 task_exit.go:204] [ 1195: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.648814 30210 task_signals.go:204] [ 1195: 1198] Signal 1195, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.648824 30210 task_exit.go:204] [ 1195: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.648832 30210 task_exit.go:204] [ 1195: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.648837 30210 task_exit.go:204] [ 1195: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.648851 30210 task_signals.go:204] [ 1195: 1199] Signal 1195, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.648858 30210 task_exit.go:204] [ 1195: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.648862 30210 task_exit.go:204] [ 1195: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.648872 30210 task_exit.go:204] [ 1195: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.648881 30210 task_signals.go:204] [ 1195: 1196] Signal 1195, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.648886 30210 task_exit.go:204] [ 1195: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.650356 30210 task_exit.go:204] [ 1195: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.650408 30210 task_exit.go:204] [ 1195: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.650428 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.650476 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.650491 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.650660 30210 task_exit.go:204] [ 1195: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.651295 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.652849 30210 syscalls.go:262] [ 1200: 1200] Allocating stack with size of 8388608 bytes D0712 20:23:47.653155 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.660265 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.660319 30210 usertrap_amd64.go:106] [ 1200: 1200] Map a usertrap vma at 67000 D0712 20:23:47.660447 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 1 D0712 20:23:47.660484 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:47.660969 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.660997 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 2 D0712 20:23:47.661013 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:47.661820 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.661881 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 3 D0712 20:23:47.661902 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:47.671001 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.671054 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 4 D0712 20:23:47.671077 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:47.672291 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.672335 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 5 D0712 20:23:47.672354 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:47.672416 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.672423 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 6 D0712 20:23:47.672430 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:47.672914 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.672935 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 7 D0712 20:23:47.672983 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:47.673182 30210 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.673199 30210 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc0003feb70 8 D0712 20:23:47.673212 30210 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:47.673409 30210 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.673431 30210 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc0003feb70 9 D0712 20:23:47.673441 30210 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:47.673775 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.673810 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 10 D0712 20:23:47.673822 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:47.683069 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.683165 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 11 D0712 20:23:47.683248 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:47.684268 30210 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.684306 30210 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc0003feb70 12 D0712 20:23:47.684324 30210 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:47.686348 30210 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.686376 30210 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc0003feb70 13 D0712 20:23:47.686392 30210 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:47.686426 30210 task_signals.go:470] [ 1200: 1200] Notified of signal 23 D0712 20:23:47.686478 30210 task_signals.go:220] [ 1200: 1200] Signal 23: delivering to handler D0712 20:23:47.694246 30210 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.694281 30210 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc0003feb70 14 D0712 20:23:47.694296 30210 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:47.694386 30210 task_exit.go:204] [ 1200: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.694416 30210 task_exit.go:204] [ 1200: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.694437 30210 task_signals.go:204] [ 1200: 1202] Signal 1200, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.694460 30210 task_exit.go:204] [ 1200: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.694475 30210 task_exit.go:204] [ 1200: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.694459 30210 task_signals.go:204] [ 1200: 1204] Signal 1200, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.694483 30210 task_exit.go:204] [ 1200: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.694443 30210 task_signals.go:204] [ 1200: 1203] Signal 1200, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.694509 30210 task_signals.go:204] [ 1200: 1201] Signal 1200, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.694522 30210 task_exit.go:204] [ 1200: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.694540 30210 task_signals.go:204] [ 1200: 1205] Signal 1200, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.694565 30210 task_exit.go:204] [ 1200: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.694576 30210 task_exit.go:204] [ 1200: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.694591 30210 task_exit.go:204] [ 1200: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.694599 30210 task_exit.go:204] [ 1200: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.694613 30210 task_exit.go:204] [ 1200: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.694623 30210 task_exit.go:204] [ 1200: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.694663 30210 task_exit.go:204] [ 1200: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.694668 30210 task_exit.go:204] [ 1200: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.694675 30210 task_exit.go:204] [ 1200: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.695990 30210 task_exit.go:204] [ 1200: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.696037 30210 task_exit.go:204] [ 1200: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.696060 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.696094 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.696108 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.696182 30210 task_exit.go:204] [ 1200: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.697621 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.699122 30210 syscalls.go:262] [ 1206: 1206] Allocating stack with size of 8388608 bytes D0712 20:23:47.699249 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.700154 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.700188 30210 usertrap_amd64.go:106] [ 1206: 1206] Map a usertrap vma at 66000 D0712 20:23:47.700261 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 1 D0712 20:23:47.700291 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:47.700795 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.700823 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 2 D0712 20:23:47.700837 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:47.701332 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.701357 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 3 D0712 20:23:47.701367 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:47.705804 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.705866 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 4 D0712 20:23:47.705886 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:47.707494 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.707543 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 5 D0712 20:23:47.707561 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:47.707764 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.707783 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 6 D0712 20:23:47.707791 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:47.708334 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.708361 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 7 D0712 20:23:47.708392 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:47.708671 30210 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.708690 30210 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0005e2510 8 D0712 20:23:47.708701 30210 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:47.709267 30210 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.709288 30210 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0005e2510 9 D0712 20:23:47.709302 30210 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:47.709353 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.709425 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 10 D0712 20:23:47.709458 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:47.717693 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.717754 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 11 D0712 20:23:47.717771 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:47.720778 30210 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.721009 30210 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0005e2510 12 D0712 20:23:47.721107 30210 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:47.721324 30210 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.721397 30210 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0005e2510 13 D0712 20:23:47.721459 30210 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:47.721615 30210 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0712 20:23:47.721730 30210 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0712 20:23:47.730742 30210 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.730791 30210 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0005e2510 14 D0712 20:23:47.730809 30210 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:47.731018 30210 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.731085 30210 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.731121 30210 task_signals.go:204] [ 1206: 1208] Signal 1206, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.731153 30210 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.731163 30210 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.731169 30210 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.731190 30210 task_signals.go:204] [ 1206: 1207] Signal 1206, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.731202 30210 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.731221 30210 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.731227 30210 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.731249 30210 task_signals.go:204] [ 1206: 1209] Signal 1206, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.731274 30210 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.731284 30210 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.731291 30210 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.731309 30210 task_signals.go:204] [ 1206: 1210] Signal 1206, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.731325 30210 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.732740 30210 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.732779 30210 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.732798 30210 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.735195 30210 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.735231 30210 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.735358 30210 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.736299 30210 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.737774 30210 syscalls.go:262] [ 1211: 1211] Allocating stack with size of 8388608 bytes D0712 20:23:47.737901 30210 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.738978 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.739030 30210 usertrap_amd64.go:106] [ 1211: 1211] Map a usertrap vma at 66000 D0712 20:23:47.739151 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 1 D0712 20:23:47.739187 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:47.739689 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.739717 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 2 D0712 20:23:47.739731 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:47.740273 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.740298 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 3 D0712 20:23:47.740311 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:47.746387 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.746419 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 4 D0712 20:23:47.746433 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:47.747484 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.747517 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 5 D0712 20:23:47.747530 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:47.747577 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.747593 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 6 D0712 20:23:47.747598 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:47.747793 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.747808 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 7 D0712 20:23:47.747817 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:47.747971 30210 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.747988 30210 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc001e1e900 8 D0712 20:23:47.748001 30210 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:47.748196 30210 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.748306 30210 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc001e1e900 9 D0712 20:23:47.748332 30210 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:47.748386 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.748405 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 10 D0712 20:23:47.748415 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:47.757440 30210 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.757478 30210 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc001e1e900 11 D0712 20:23:47.757492 30210 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:47.761054 30210 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.761080 30210 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc001e1e900 12 D0712 20:23:47.761093 30210 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:47.761169 30210 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.761195 30210 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc001e1e900 13 D0712 20:23:47.761208 30210 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:47.761268 30210 task_signals.go:470] [ 1211: 1211] Notified of signal 23 D0712 20:23:47.761351 30210 task_signals.go:220] [ 1211: 1211] Signal 23: delivering to handler D0712 20:23:47.769543 30210 task_signals.go:309] [ 1211: 1211] failed to restore from a signal frame: bad address D0712 20:23:47.769592 30210 task_signals.go:470] [ 1211: 1211] Notified of signal 11 D0712 20:23:47.769612 30210 task_signals.go:220] [ 1211: 1211] Signal 11: delivering to handler W0712 20:23:47.810047 30386 util.go:64] FATAL ERROR: waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF W0712 20:23:47.810213 30386 main.go:274] Failure to execute command, err: 1 W0712 20:23:47.822821 30135 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0712 20:23:47.822819 1 connection.go:127] sock read failed, closing connection: EOF I0712 20:23:47.822953 1 gofer.go:319] All lisafs servers exited. I0712 20:23:47.822998 1 main.go:265] Exiting with status: 0 D0712 20:23:47.830619 30135 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-0 D0712 20:23:47.830709 30135 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-0 D0712 20:23:47.830718 30135 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-0 D0712 20:23:47.830725 30135 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-0" D0712 20:23:47.830815 30135 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-0, PID: 30203 D0712 20:23:47.833393 30135 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-0" D0712 20:23:47.833462 30135 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833524 30135 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833545 30135 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833553 30135 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833565 30135 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833572 30135 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833579 30135 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833602 30135 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833609 30135 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833641 30135 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833647 30135 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833653 30135 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-0" D0712 20:23:47.833660 30135 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-0" I0712 20:23:47.999324 30135 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0712 20:23:47.965734 30690 main.go:230] *************************** I0712 20:23:47.965793 30690 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0712 20:23:47.965829 30690 main.go:232] Version 0.0.0 I0712 20:23:47.965848 30690 main.go:233] GOOS: linux I0712 20:23:47.965866 30690 main.go:234] GOARCH: amd64 I0712 20:23:47.965882 30690 main.go:235] PID: 30690 I0712 20:23:47.965901 30690 main.go:236] UID: 0, GID: 0 I0712 20:23:47.965932 30690 main.go:237] Configuration: I0712 20:23:47.966024 30690 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 20:23:47.966081 30690 main.go:239] Platform: systrap I0712 20:23:47.966116 30690 main.go:240] FileAccess: shared I0712 20:23:47.966151 30690 main.go:241] Directfs: true I0712 20:23:47.966187 30690 main.go:242] Overlay: none I0712 20:23:47.966246 30690 main.go:243] Network: sandbox, logging: false I0712 20:23:47.966299 30690 main.go:244] Strace: false, max size: 1024, syscalls: I0712 20:23:47.966319 30690 main.go:245] IOURING: false I0712 20:23:47.966347 30690 main.go:246] Debug: true I0712 20:23:47.966365 30690 main.go:247] Systemd: false I0712 20:23:47.966389 30690 main.go:248] *************************** D0712 20:23:47.966451 30690 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 20:23:47.999454 30690 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory W0712 20:23:47.999687 30690 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-0"]: exit status 128 I0712 20:23:47.965734 30690 main.go:230] *************************** I0712 20:23:47.965793 30690 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0712 20:23:47.965829 30690 main.go:232] Version 0.0.0 I0712 20:23:47.965848 30690 main.go:233] GOOS: linux I0712 20:23:47.965866 30690 main.go:234] GOARCH: amd64 I0712 20:23:47.965882 30690 main.go:235] PID: 30690 I0712 20:23:47.965901 30690 main.go:236] UID: 0, GID: 0 I0712 20:23:47.965932 30690 main.go:237] Configuration: I0712 20:23:47.966024 30690 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 20:23:47.966081 30690 main.go:239] Platform: systrap I0712 20:23:47.966116 30690 main.go:240] FileAccess: shared I0712 20:23:47.966151 30690 main.go:241] Directfs: true I0712 20:23:47.966187 30690 main.go:242] Overlay: none I0712 20:23:47.966246 30690 main.go:243] Network: sandbox, logging: false I0712 20:23:47.966299 30690 main.go:244] Strace: false, max size: 1024, syscalls: I0712 20:23:47.966319 30690 main.go:245] IOURING: false I0712 20:23:47.966347 30690 main.go:246] Debug: true I0712 20:23:47.966365 30690 main.go:247] Systemd: false I0712 20:23:47.966389 30690 main.go:248] *************************** D0712 20:23:47.966451 30690 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 20:23:47.999454 30690 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory W0712 20:23:47.999687 30690 main.go:274] Failure to execute command, err: 1 [11501068.657800] [ 681897] 0 681897 4533 18 81920 0 0 exe [11501068.666281] [ 681896] 0 681896 4151 21 36864 0 0 exe [11501068.674841] [ 681898] 0 681898 4151 21 36864 0 0 exe [11501068.683397] [ 681899] 0 681899 4151 21 36864 0 0 exe [11501068.691861] [ 681900] 0 681900 4139 19 36864 0 0 exe [11501068.700327] [ 681901] 0 681901 4133 18 36864 0 0 exe [11501068.708820] [ 681902] 0 681902 4133 18 36864 0 0 exe [11501068.717378] [ 681903] 0 681903 4151 21 36864 0 0 exe [11501068.725859] [ 681904] 0 681904 4533 18 81920 0 0 exe [11501068.734324] [ 681905] 0 681905 4139 19 36864 0 0 exe [11501068.742785] [ 681906] 0 681906 4151 21 36864 0 0 exe [11501068.751381] [ 681907] 0 681907 4151 21 36864 0 0 exe [11501068.759863] [ 681908] 0 681908 4151 21 36864 0 0 exe [11501068.768326] [ 681909] 0 681909 4133 18 36864 0 0 exe [11501068.776877] [ 681910] 0 681910 4133 18 36864 0 0 exe [11501068.785357] [ 681911] 0 681911 4133 18 36864 0 0 exe [11501068.793867] [ 681912] 0 681912 4145 20 36864 0 0 exe [11501068.802337] [ 681913] 0 681913 4133 18 36864 0 0 exe [11501068.810805] [ 681914] 0 681914 4151 21 36864 0 0 exe [11501068.819284] [ 681915] 0 681915 4139 18 36864 0 0 exe [11501068.827752] [ 681917] 0 681917 4151 21 36864 0 0 exe [11501068.836301] [ 681916] 0 681916 4151 21 36864 0 0 exe [11501068.844768] [ 681919] 0 681919 4545 21 81920 0 0 exe [11501068.853246] [ 681918] 0 681918 4145 20 36864 0 0 exe [11501068.861722] [ 681920] 0 681920 4151 21 36864 0 0 exe [11501068.870191] [ 681921] 0 681921 4151 21 36864 0 0 exe [11501068.878668] [ 681922] 0 681922 4139 18 36864 0 0 exe [11501068.887157] [ 681923] 0 681923 4545 21 81920 0 0 exe [11501068.895634] [ 681924] 0 681924 4151 21 36864 0 0 exe [11501068.904106] [ 681929] 0 681929 4151 21 36864 0 0 exe [11501068.912577] [ 681935] 0 681935 4151 21 36864 0 0 exe [11501068.921056] [ 682708] 0 682708 4157 22 28672 0 0 exe [11501068.929610] [ 682717] 0 682717 4157 22 28672 0 0 exe [11501068.938077] [ 682721] 0 682721 4157 22 28672 0 0 exe [11501068.946544] [ 682800] 0 682800 4151 21 36864 0 0 exe [11501068.955023] [ 682802] 0 682802 4151 21 36864 0 0 exe [11501068.963490] [ 682806] 0 682806 4151 21 36864 0 0 exe [11501068.971987] [ 683096] 0 683096 4151 21 28672 0 0 exe [11501068.980647] [ 683097] 0 683097 4151 21 28672 0 0 exe [11501068.989118] [ 683098] 0 683098 4151 21 28672 0 0 exe [11501068.997593] [ 683099] 0 683099 4151 21 28672 0 0 exe [11501069.006074] [ 683122] 0 683122 4151 21 28672 0 0 exe [11501069.014628] [ 683140] 0 683140 4479 20 69632 0 0 exe [11501069.023094] [ 683141] 0 683141 4479 20 69632 0 0 exe [11501069.031564] [ 683142] 0 683142 4151 21 28672 0 0 exe [11501069.040031] [ 683186] 0 683186 4151 21 28672 0 0 exe [11501069.048508] [ 683420] 0 683420 4563 20 73728 0 0 exe [11501069.056977] [ 683428] 0 683428 4151 21 28672 0 0 exe [11501069.065441] [ 683558] 0 683558 1 1 12288 0 0 exe [11501069.073910] [ 683569] 0 683569 1 1 12288 0 0 exe [11501069.082821] [ 683693] 0 683693 1 1 12288 0 0 exe [11501069.091302] [ 683750] 0 683750 1 1 12288 0 0 exe [11501069.099770] [ 683770] 0 683770 1 1 12288 0 0 exe [11501069.108250] [ 683792] 0 683792 1 1 12288 0 0 exe [11501069.116731] [ 683809] 0 683809 1 1 12288 0 0 exe [11501069.125206] [ 683813] 0 683813 1 1 12288 0 0 exe [11501069.133686] [ 684085] 0 684085 4533 18 81920 0 0 exe [11501069.142329] [ 684091] 0 684091 4145 20 36864 0 0 exe [11501069.150800] [ 684310] 65534 684310 1 1 12288 0 0 exe [11501069.159268] [ 684316] 65534 684316 1 1 12288 0 0 exe [11501069.167734] [ 684345] 0 684345 4145 20 36864 0 0 exe [11501069.176201] [ 684536] 0 684536 1 1 12288 0 0 exe [11501069.184685] [ 684547] 0 684547 1 1 12288 0 0 exe [11501069.193205] [ 684560] 0 684560 1 1 12288 0 0 exe [11501069.201676] [ 684610] 0 684610 1 1 12288 0 0 exe [11501069.210157] [ 684654] 0 684654 1 1 12288 0 0 exe [11501069.218627] [ 684686] 0 684686 1 1 12288 0 0 exe [11501069.227098] [ 684711] 0 684711 1 1 12288 0 0 exe [11501069.235566] [ 684731] 0 684731 1 1 12288 0 0 exe [11501069.244045] [ 684763] 0 684763 1 1 12288 0 0 exe [11501069.252518] [ 684779] 0 684779 1 1 12288 0 0 exe [11501069.260995] [ 684797] 0 684797 1 1 12288 0 0 exe [11501069.269466] [ 684811] 0 684811 1 1 12288 0 0 exe [11501069.278029] [ 684848] 0 684848 1 1 12288 0 0 exe [11501069.286498] [ 684854] 0 684854 1 1 12288 0 0 exe [11501069.295057] [ 684876] 0 684876 1 1 12288 0 0 exe [11501069.303532] [ 684880] 0 684880 1 1 12288 0 0 exe [11501069.311999] [ 687179] 0 687179 4157 22 28672 0 0 exe [11501069.320479] [ 687213] 0 687213 4157 22 28672 0 0 exe [11501069.330008] [ 687234] 0 687234 105692 71130 790528 0 0 exe [11501069.338535] [ 687235] 0 687235 105692 71130 790528 0 0 exe [11501069.347016] [ 687447] 0 687447 4139 19 36864 0 0 exe [11501069.355504] [ 687455] 0 687455 4151 21 36864 0 0 exe [11501069.363971] [ 687485] 0 687485 4151 21 36864 0 0 exe [11501069.372521] [ 687780] 65534 687780 1 1 12288 0 0 exe [11501069.380987] [ 687784] 65534 687784 1 1 12288 0 0 exe [11501069.389552] [ 687879] 0 687879 4151 21 36864 0 0 exe [11501069.398133] [ 688264] 0 688264 4633 20 73728 0 0 exe [11501069.406600] [ 688268] 0 688268 4633 20 73728 0 0 exe [11501069.415081] [ 688280] 0 688280 4633 20 73728 0 0 exe [11501069.423549] [ 688286] 0 688286 4151 21 36864 0 0 exe [11501069.432115] [ 688666] 0 688666 4151 21 36864 0 0 exe [11501069.440586] [ 688720] 0 688720 1 1 12288 0 0 exe [11501069.449057] [ 688728] 0 688728 1 1 12288 0 0 exe [11501069.457520] [ 688738] 0 688738 1 1 12288 0 0 exe [11501069.465982] [ 688747] 0 688747 1 1 12288 0 0 exe [11501069.474445] [ 688816] 0 688816 1 1 12288 0 0 exe [11501069.482907] [ 688834] 0 688834 4151 21 36864 0 0 exe [11501069.491371] [ 688875] 0 688875 1 1 12288 0 0 exe [11501069.499928] [ 688889] 0 688889 1 1 12288 0 0 exe [11501069.508487] [ 688907] 0 688907 1 1 12288 0 0 exe [11501069.516951] [ 688929] 0 688929 1 1 12288 0 0 exe [11501069.525432] [ 688933] 0 688933 1 1 12288 0 0 exe [11501069.533897] [ 688960] 0 688960 1 1 12288 0 0 exe [11501069.542378] [ 688966] 0 688966 1 1 12288 0 0 exe [11501069.550862] [ 688981] 0 688981 1 1 12288 0 0 exe [11501069.559327] [ 688990] 0 688990 1 1 12288 0 0 exe [11501069.567887] [ 689013] 0 689013 1 1 12288 0 0 exe [11501069.576354] [ 689032] 0 689032 1 1 12288 0 0 exe [11501069.584817] [ 689057] 0 689057 1 1 12288 0 0 exe [11501069.593384] [ 689103] 0 689103 1 1 12288 0 0 exe [11501069.601859] [ 689137] 0 689137 1 1 12288 0 0 exe [11501069.610332] [ 689177] 0 689177 1 1 12288 0 0 exe [11501069.618895] [ 689211] 0 689211 1 1 12288 0 0 exe [11501069.627359] [ 689369] 0 689369 1 1 12288 0 0 exe [11501069.635820] [ 689397] 0 689397 1 1 12288 0 0 exe [11501069.644320] [ 689413] 0 689413 1 1 12288 0 0 exe [11501069.652902] [ 689503] 0 689503 4151 21 36864 0 0 exe [11501069.661388] [ 690218] 0 690218 4151 21 28672 0 0 exe [11501069.669856] [ 690765] 0 690765 4163 23 28672 0 0 exe [11501069.678409] [ 690816] 0 690816 4151 21 28672 0 0 exe [11501069.686872] [ 690926] 0 690926 4151 21 36864 0 0 exe [11501069.695339] [ 691256] 0 691256 4157 22 28672 0 0 exe [11501069.703888] [ 691546] 65534 691546 1 1 12288 0 0 exe [11501069.712350] [ 691604] 0 691604 4145 20 36864 0 0 exe [11501069.720814] [ 691616] 0 691616 4145 20 36864 0 0 exe [11501069.729371] [ 691639] 0 691639 4151 21 36864 0 0 exe [11501069.737863] [ 691642] 0 691642 4145 20 36864 0 0 exe [11501069.746328] [ 691670] 0 691670 4545 21 81920 0 0 exe [11501069.754793] [ 691671] 0 691671 4545 21 81920 0 0 exe [11501069.763255] [ 691674] 0 691674 4545 21 81920 0 0 exe [11501069.771801] [ 691682] 0 691682 4145 20 36864 0 0 exe [11501069.780260] [ 691683] 0 691683 4145 20 36864 0 0 exe [11501069.788721] [ 691686] 0 691686 4545 21 81920 0 0 exe [11501069.797195] [ 691687] 0 691687 4545 21 81920 0 0 exe [11501069.805657] [ 691688] 0 691688 4545 21 81920 0 0 exe [11501069.814121] [ 691689] 0 691689 4151 21 36864 0 0 exe [11501069.822583] [ 691692] 0 691692 4151 21 36864 0 0 exe [11501069.831047] [ 691789] 0 691789 4633 20 73728 0 0 exe [11501069.839505] [ 691906] 0 691906 1 1 12288 0 0 exe [11501069.847968] [ 691910] 0 691910 1 1 12288 0 0 exe [11501069.856432] [ 691915] 0 691915 1 1 12288 0 0 exe [11501069.864899] [ 691921] 0 691921 1 1 12288 0 0 exe [11501069.873458] [ 691925] 0 691925 1 1 12288 0 0 exe [11501069.882007] [ 691929] 0 691929 1 1 12288 0 0 exe [11501069.890477] [ 691933] 0 691933 1 1 12288 0 0 exe [11501069.898938] [ 691938] 0 691938 1 1 12288 0 0 exe [11501069.907399] [ 691939] 0 691939 1 1 12288 0 0 exe [11501069.915860] [ 691945] 0 691945 1 1 12288 0 0 exe [11501069.924320] [ 691949] 0 691949 1 1 12288 0 0 exe [11501069.932782] [ 691953] 0 691953 1 1 12288 0 0 exe [11501069.941255] [ 692030] 0 692030 4151 21 28672 0 0 exe [11501069.949717] [ 692031] 0 692031 4151 21 28672 0 0 exe [11501069.958269] [ 692089] 0 692089 4151 21 28672 0 0 exe [11501069.966733] [ 692518] 0 692518 4151 21 28672 0 0 exe [11501069.975206] [ 692519] 0 692519 4151 21 28672 0 0 exe [11501069.983673] [ 692529] 0 692529 4151 21 28672 0 0 exe [11501069.992226] [ 692586] 0 692586 4139 19 28672 0 0 exe [11501070.000700] [ 692594] 0 692594 4151 21 28672 0 0 exe [11501070.009169] [ 692609] 0 692609 4151 21 28672 0 0 exe [11501070.017715] [ 692651] 0 692651 1 1 12288 0 0 exe [11501070.026175] [ 692657] 0 692657 1 1 12288 0 0 exe [11501070.034643] [ 692661] 0 692661 1 1 12288 0 0 exe [11501070.043111] [ 692665] 0 692665 1 1 12288 0 0 exe [11501070.051577] [ 692739] 0 692739 1 1 12288 0 0 exe [11501070.060047] [ 692800] 0 692800 4151 21 28672 0 0 exe [11501070.068521] [ 692819] 0 692819 4151 21 28672 0 0 exe [11501070.076986] [ 692820] 0 692820 4151 21 28672 0 0 exe [11501070.085554] [ 692826] 0 692826 103587 69076 823296 0 0 exe [11501070.094027] [ 692827] 0 692827 103587 69076 823296 0 0 exe [11501070.102499] [ 692835] 0 692835 4175 25 28672 0 0 exe [11501070.110957] [ 692836] 0 692836 4175 25 28672 0 0 exe [11501070.119418] [ 692837] 0 692837 4175 25 28672 0 0 exe [11501070.127879] [ 692859] 0 692859 4145 20 28672 0 0 exe [11501070.136339] [ 692952] 0 692952 4549 21 57344 0 0 exe [11501070.144801] [ 692956] 0 692956 4549 21 57344 0 0 exe [11501070.153358] [ 692957] 0 692957 4157 22 28672 0 0 exe [11501070.161905] [ 692982] 0 692982 4414 23 53248 0 0 exe [11501070.170451] [ 692983] 0 692983 4414 23 53248 0 0 exe [11501070.178911] [ 692984] 0 692984 4302 22 73728 0 0 exe [11501070.187397] [ 692985] 0 692985 4302 22 73728 0 0 exe [11501070.195870] [ 692986] 0 692986 4786 20 86016 0 0 exe [11501070.204330] [ 692987] 0 692987 4786 20 86016 0 0 exe [11501070.212793] [ 692988] 0 692988 4490 21 77824 0 0 exe [11501070.221440] [ 692989] 0 692989 4490 21 77824 0 0 exe [11501070.229902] [ 692990] 0 692990 4404 21 69632 0 0 exe [11501070.238452] [ 692991] 0 692991 4404 21 69632 0 0 exe [11501070.246910] [ 692992] 0 692992 4151 21 28672 0 0 exe [11501070.255372] [ 692993] 0 692993 4151 21 28672 0 0 exe [11501070.263924] [ 692994] 0 692994 4404 21 69632 0 0 exe [11501070.272386] [ 692995] 0 692995 4404 21 69632 0 0 exe [11501070.280850] [ 692996] 0 692996 4404 21 69632 0 0 exe [11501070.289316] [ 692997] 0 692997 4145 18 28672 0 0 exe [11501070.297862] [ 692998] 0 692998 4145 18 28672 0 0 exe [11501070.306341] [ 692999] 0 692999 4543 20 57344 0 0 exe [11501070.314803] [ 693000] 0 693000 4543 20 57344 0 0 exe [11501070.323361] [ 693001] 0 693001 4543 20 57344 0 0 exe [11501070.331819] [ 693002] 0 693002 4543 20 57344 0 0 exe [11501070.340278] [ 693004] 0 693004 4786 20 86016 0 0 exe [11501070.348739] [ 693005] 0 693005 4414 23 53248 0 0 exe [11501070.357208] [ 693006] 0 693006 4302 22 73728 0 0 exe [11501070.365673] [ 693007] 0 693007 6284 21 94208 0 0 exe [11501070.374225] [ 693008] 0 693008 4145 18 28672 0 0 exe [11501070.382683] [ 693009] 0 693009 4145 18 28672 0 0 exe [11501070.391145] [ 693010] 0 693010 4145 20 28672 0 0 exe [11501070.399699] [ 693012] 0 693012 4145 20 28672 0 0 exe [11501070.408165] [ 693013] 0 693013 4302 22 73728 0 0 exe [11501070.416628] [ 693014] 0 693014 4410 22 69632 0 0 exe [11501070.425142] [ 693015] 0 693015 4410 22 69632 0 0 exe [11501070.433626] [ 693016] 0 693016 4295 21 49152 0 0 exe [11501070.442090] [ 693017] 0 693017 4295 21 49152 0 0 exe [11501070.450552] [ 693018] 0 693018 4549 21 57344 0 0 exe [11501070.459013] [ 693019] 0 693019 4549 21 57344 0 0 exe [11501070.467474] [ 693037] 0 693037 4151 21 28672 0 0 exe [11501070.475936] [ 693052] 0 693052 4549 21 57344 0 0 exe [11501070.484404] [ 693055] 0 693055 4295 21 49152 0 0 exe [11501070.492963] [ 693057] 0 693057 4404 21 69632 0 0 exe [11501070.501426] [ 693064] 0 693064 4295 21 49152 0 0 exe [11501070.509893] [ 693070] 0 693070 4157 22 28672 0 0 exe [11501070.518366] [ 693085] 0 693085 4295 21 49152 0 0 exe [11501070.526839] [ 693144] 0 693144 4549 21 57344 0 0 exe [11501070.535319] [ 693148] 0 693148 4404 21 69632 0 0 exe [11501070.543795] [ 693150] 0 693150 4404 21 69632 0 0 exe [11501070.552257] [ 693157] 0 693157 4151 21 36864 0 0 exe [11501070.560804] [ 693160] 0 693160 4151 21 36864 0 0 exe [11501070.569350] [ 693169] 0 693169 4169 24 28672 0 0 exe [11501070.577810] [ 693170] 0 693170 4151 21 36864 0 0 exe [11501070.586272] [ 693212] 0 693212 4549 20 73728 0 0 exe [11501070.594911] [ 693224] 0 693224 4145 20 28672 0 0 exe [11501070.603375] [ 693225] 0 693225 4145 20 28672 0 0 exe [11501070.611839] [ 693265] 0 693265 4549 21 57344 0 0 exe [11501070.620303] [ 693323] 0 693323 4157 22 28672 0 0 exe [11501070.628774] [ 693369] 0 693369 4151 21 36864 0 0 exe [11501070.637247] [ 693375] 0 693375 4151 21 36864 0 0 exe [11501070.645718] [ 693378] 0 693378 4151 21 36864 0 0 exe [11501070.654268] [ 693380] 0 693380 4151 21 36864 0 0 exe [11501070.662728] [ 693441] 0 693441 4157 22 28672 0 0 exe [11501070.671193] [ 693443] 0 693443 4151 21 28672 0 0 exe [11501070.679746] [ 693444] 0 693444 4157 22 28672 0 0 exe [11501070.688211] [ 693466] 0 693466 452103 9171 434176 0 0 image [11501070.696864] [ 693493] 0 693493 396484 9047 405504 0 0 exe [11501070.705343] [ 693496] 0 693496 1509223 108390 2351104 0 0 exe [11501070.713895] [ 693575] 0 693575 4151 21 36864 0 0 exe [11501070.722449] [ 693584] 0 693584 4410 22 69632 0 0 exe [11501070.730916] [ 693585] 0 693585 1 0 12288 0 0 exe [11501070.739381] [ 693607] 0 693607 28370 3144 237568 0 0 exe [11501070.747848] [ 693630] 0 693630 4151 21 36864 0 0 exe [11501070.756411] [ 693644] 0 693644 4133 16 28672 0 0 exe [11501070.764876] [ 693645] 0 693645 4133 16 28672 0 0 exe [11501070.773348] [ 693646] 0 693646 4133 16 28672 0 0 exe [11501070.781813] [ 693647] 0 693647 4133 16 28672 0 0 exe [11501070.790294] [ 693648] 0 693648 4133 16 28672 0 0 exe [11501070.798755] [ 693649] 0 693649 4133 16 28672 0 0 exe [11501070.807222] [ 693650] 0 693650 4133 16 28672 0 0 exe [11501070.815691] [ 693651] 0 693651 4133 16 28672 0 0 exe [11501070.824168] [ 693652] 0 693652 4145 18 28672 0 0 exe [11501070.832635] [ 693653] 0 693653 4145 18 28672 0 0 exe [11501070.841131] [ 693654] 0 693654 4133 16 28672 0 0 exe [11501070.849597] [ 693655] 0 693655 4133 16 28672 0 0 exe [11501070.858061] [ 693656] 0 693656 4133 16 28672 0 0 exe [11501070.866526] [ 693657] 0 693657 4133 16 28672 0 0 exe [11501070.874992] [ 693658] 0 693658 4133 16 28672 0 0 exe [11501070.883459] [ 693661] 0 693661 4133 16 28672 0 0 exe [11501070.891930] [ 693662] 0 693662 4133 16 28672 0 0 exe [11501070.900394] [ 693666] 0 693666 4133 16 28672 0 0 exe [11501070.908857] [ 693668] 0 693668 4151 18 28672 0 0 exe [11501070.917332] [ 693669] 0 693669 4133 16 28672 0 0 exe [11501070.925792] [ 693670] 0 693670 4157 22 28672 0 0 exe [11501070.934254] [ 693671] 0 693671 4151 18 28672 0 0 exe [11501070.942718] [ 693672] 0 693672 4151 18 28672 0 0 exe [11501070.951183] [ 693673] 0 693673 4133 16 28672 0 0 exe [11501070.959659] [ 693674] 0 693674 4133 16 28672 0 0 exe [11501070.968121] [ 693675] 0 693675 4157 22 28672 0 0 exe [11501070.976581] [ 693676] 0 693676 4175 25 28672 0 0 exe [11501070.985043] [ 693677] 0 693677 4133 16 28672 0 0 exe [11501070.993516] [ 693678] 0 693678 4133 16 28672 0 0 exe [11501071.001979] [ 693679] 0 693679 4133 16 28672 0 0 exe [11501071.010437] [ 693680] 0 693680 4133 16 28672 0 0 exe [11501071.018900] [ 693681] 0 693681 4133 16 28672 0 0 exe [11501071.027363] [ 693682] 0 693682 4133 16 28672 0 0 exe [11501071.035826] [ 693683] 0 693683 4133 16 28672 0 0 exe [11501071.044288] [ 693684] 0 693684 4133 16 28672 0 0 exe [11501071.052750] [ 693685] 0 693685 4133 16 28672 0 0 exe [11501071.061226] [ 693686] 0 693686 4163 23 28672 0 0 exe [11501071.069690] [ 693687] 0 693687 4175 25 28672 0 0 exe [11501071.078152] [ 693688] 0 693688 4163 23 28672 0 0 exe [11501071.086703] [ 693689] 0 693689 4133 16 28672 0 0 exe [11501071.095164] [ 693690] 0 693690 4133 16 28672 0 0 exe [11501071.103625] [ 693691] 0 693691 4133 16 28672 0 0 exe [11501071.112100] [ 693692] 0 693692 4163 23 28672 0 0 exe [11501071.120565] [ 693693] 0 693693 4139 18 28672 0 0 exe [11501071.129031] [ 693694] 0 693694 4133 16 28672 0 0 exe [11501071.137582] [ 693695] 0 693695 4163 23 28672 0 0 exe [11501071.146047] [ 693696] 0 693696 4139 18 28672 0 0 exe [11501071.154505] [ 693697] 0 693697 4133 16 28672 0 0 exe [11501071.162970] [ 693698] 0 693698 6285 23 94208 0 0 exe [11501071.171432] [ 693699] 0 693699 4163 23 28672 0 0 exe [11501071.179895] [ 693700] 0 693700 6285 23 94208 0 0 exe [11501071.188451] [ 693701] 0 693701 4133 16 28672 0 0 exe [11501071.196914] [ 693702] 0 693702 4133 16 28672 0 0 exe [11501071.205385] [ 693703] 0 693703 4163 23 28672 0 0 exe [11501071.213847] [ 693704] 0 693704 4163 23 28672 0 0 exe [11501071.222311] [ 693705] 0 693705 4133 16 28672 0 0 exe [11501071.230773] [ 693706] 0 693706 4139 18 28672 0 0 exe [11501071.239235] [ 693707] 0 693707 4157 22 28672 0 0 exe [11501071.247696] [ 693708] 0 693708 4151 19 28672 0 0 exe [11501071.256161] [ 693709] 0 693709 4163 23 28672 0 0 exe [11501071.264630] [ 693711] 0 693711 4151 19 28672 0 0 exe [11501071.273120] [ 693712] 0 693712 4157 22 28672 0 0 exe [11501071.281673] [ 693713] 0 693713 4145 18 28672 0 0 exe [11501071.290134] [ 693714] 0 693714 4145 18 28672 0 0 exe [11501071.298681] [ 693722] 0 693722 4175 25 28672 0 0 exe [11501071.307231] [ 693730] 0 693730 4490 23 69632 0 0 exe [11501071.315775] [ 693732] 0 693732 4175 25 28672 0 0 exe [11501071.324236] [ 693731] 0 693731 4163 23 28672 0 0 exe [11501071.332700] [ 693733] 0 693733 6285 23 94208 0 0 exe [11501071.341181] [ 693734] 0 693734 4163 23 28672 0 0 exe [11501071.349652] [ 693735] 0 693735 4175 25 28672 0 0 exe [11501071.358124] [ 693738] 0 693738 6285 23 94208 0 0 exe [11501071.366591] [ 693749] 0 693749 4163 23 28672 0 0 exe [11501071.375070] [ 693764] 0 693764 4410 22 69632 0 0 exe [11501071.384230] [ 693798] 65534 693798 1 1 12288 0 0 exe [11501071.392714] [ 693800] 65534 693800 1 1 12288 0 0 exe [11501071.401195] [ 693807] 65534 693807 1 1 12288 0 0 exe [11501071.409676] [ 693808] 65534 693808 1 1 12288 0 0 exe [11501071.418166] [ 693812] 65534 693812 1 1 12288 0 0 exe [11501071.426648] [ 693814] 65534 693814 491 1 45056 0 0 exe [11501071.435135] [ 693915] 0 693915 4490 23 69632 0 0 exe [11501071.443611] [ 693916] 0 693916 4490 23 69632 0 0 exe [11501071.452102] [ 693935] 0 693935 6285 23 94208 0 0 exe [11501071.460585] [ 693936] 0 693936 4157 22 28672 0 0 exe [11501071.469066] [ 693943] 0 693943 4157 22 28672 0 0 exe [11501071.477541] [ 693945] 0 693945 4157 22 28672 0 0 exe [11501071.486017] [ 693949] 0 693949 4157 22 28672 0 0 exe [11501071.494495] [ 693962] 0 693962 6285 23 94208 0 0 exe [11501071.502968] [ 694010] 0 694010 4175 25 28672 0 0 exe [11501071.511448] [ 694015] 0 694015 6285 23 94208 0 0 exe [11501071.519932] [ 694020] 0 694020 4157 22 28672 0 0 exe [11501071.528409] [ 694021] 0 694021 4145 18 28672 0 0 exe [11501071.536889] [ 694022] 0 694022 4145 18 28672 0 0 exe [11501071.545366] [ 694030] 0 694030 4163 23 28672 0 0 exe [11501071.553838] [ 694034] 0 694034 4139 19 28672 0 0 exe [11501071.562358] [ 694036] 0 694036 4151 21 36864 0 0 exe [11501071.570839] [ 694037] 0 694037 4145 20 36864 0 0 exe [11501071.579320] [ 694045] 0 694045 14526 9564 163840 0 0 exe [11501071.587809] [ 694052] 0 694052 14526 9564 163840 0 0 exe [11501071.596298] [ 694071] 0 694071 4139 19 28672 0 0 exe [11501071.604777] [ 694161] 0 694161 4410 22 69632 0 0 exe [11501071.613247] [ 694162] 0 694162 4410 22 69632 0 0 exe [11501071.621724] [ 694185] 0 694185 4151 21 36864 0 0 exe [11501071.630199] [ 694224] 0 694224 4151 21 28672 0 0 exe [11501071.638671] [ 694225] 0 694225 4151 21 28672 0 0 exe [11501071.647153] [ 694228] 0 694228 4145 20 28672 0 0 exe [11501071.655632] [ 694244] 0 694244 4175 25 28672 0 0 exe [11501071.664109] [ 694246] 0 694246 4163 23 28672 0 0 exe [11501071.672594] [ 694247] 0 694247 4490 21 77824 0 0 exe [11501071.681076] [ 694277] 0 694277 4163 23 28672 0 0 exe [11501071.689550] [ 694290] 0 694290 4163 23 28672 0 0 exe [11501071.698028] [ 694377] 0 694377 4151 21 36864 0 0 exe [11501071.706500] [ 694392] 0 694392 4490 21 77824 0 0 exe [11501071.714977] [ 694394] 0 694394 4490 21 77824 0 0 exe [11501071.723458] [ 694396] 0 694396 4151 21 28672 0 0 exe [11501071.731943] [ 694408] 0 694408 184723 1752 139264 0 0 image [11501071.740798] [ 694415] 0 694415 184723 1034 139264 0 0 exe [11501071.749278] [ 694416] 0 694416 513283 58321 1081344 0 0 exe [11501071.757759] [ 694446] 0 694446 4157 22 36864 0 0 exe [11501071.766242] [ 694447] 0 694447 4414 23 53248 0 0 exe [11501071.774719] [ 694466] 0 694466 1 1 12288 0 0 exe [11501071.783195] [ 694484] 0 694484 28403 2743 237568 0 0 exe [11501071.791685] [ 694502] 0 694502 184787 1592 143360 0 0 image [11501071.800351] [ 694514] 0 694514 4157 22 28672 0 0 exe [11501071.808861] [ 694524] 0 694524 39838 11029 315392 0 0 exe [11501071.817368] [ 694549] 0 694549 852 1 53248 0 0 exe [11501071.825843] [ 694566] 0 694566 4157 22 36864 0 0 exe [11501071.834402] [ 694576] 0 694576 880 1 65536 0 0 exe [11501071.842869] [ 694577] 0 694577 694 1 49152 0 0 exe [11501071.851334] [ 694580] 0 694580 750 105 53248 0 0 exe [11501071.859803] [ 694586] 0 694586 715 1 49152 0 0 exe [11501071.868358] [ 694595] 0 694595 741 1 65536 0 0 exe [11501071.876821] [ 694596] 0 694596 778 1 61440 0 0 exe [11501071.885304] [ 694612] 0 694612 757 1 61440 0 0 exe [11501071.893778] [ 694623] 0 694623 1 1 12288 0 0 exe [11501071.902246] [ 694630] 0 694630 2893 1 77824 0 0 exe [11501071.910739] [ 694662] 0 694662 1 1 12288 0 0 exe [11501071.919325] [ 694718] 0 694718 1 1 12288 0 0 exe [11501071.927803] [ 694857] 0 694857 4157 22 28672 0 0 exe [11501071.936272] [ 694932] 0 694932 4414 23 53248 0 0 exe [11501071.944735] [ 694951] 0 694951 4151 21 36864 0 0 exe [11501071.953212] [ 694955] 0 694955 4151 21 36864 0 0 exe [11501071.961675] [ 695078] 0 695078 4151 21 28672 0 0 exe [11501071.970152] [ 695162] 0 695162 2332 1 69632 0 0 exe [11501071.978622] [ 695164] 0 695164 1 1 12288 0 0 exe [11501071.987093] [ 695172] 0 695172 1 1 12288 0 0 exe [11501071.995562] [ 695180] 0 695180 1 1 12288 0 0 exe [11501072.004123] [ 695181] 0 695181 1 1 12288 0 0 exe [11501072.012618] [ 695185] 0 695185 2342 1 77824 0 0 exe [11501072.021362] [ 695258] 0 695258 4157 22 36864 0 0 exe [11501072.029845] [ 695274] 0 695274 470664 11663 446464 0 0 image [11501072.038501] [ 695287] 0 695287 4151 21 36864 0 0 exe [11501072.047010] [ 695291] 0 695291 470376 10036 442368 0 0 image [11501072.055661] [ 695303] 0 695303 433606 10177 421888 0 0 exe [11501072.064139] [ 695304] 0 695304 1021192 21495 856064 0 0 exe [11501072.072604] [ 695316] 0 695316 19149 6855 208896 0 0 exe [11501072.081074] [ 695374] 0 695374 4151 21 36864 0 0 exe [11501072.089544] [ 695378] 0 695378 763 1 49152 0 0 exe [11501072.098099] [ 695395] 0 695395 732 1 61440 0 0 exe [11501072.106668] [ 695407] 0 695407 1 0 12288 0 0 exe [11501072.115243] [ 695424] 0 695424 2349 1 65536 0 0 exe [11501072.123738] [ 695428] 0 695428 4414 23 53248 0 0 exe [11501072.132218] [ 695430] 0 695430 4414 23 53248 0 0 exe [11501072.140702] [ 695446] 0 695446 28373 2754 233472 0 0 exe [11501072.149198] [ 695455] 0 695455 4163 23 28672 0 0 exe [11501072.157752] [ 695506] 0 695506 4151 21 36864 0 0 exe [11501072.166220] [ 695573] 0 695573 1 1 12288 0 0 exe [11501072.174810] [ 695756] 0 695756 4157 22 36864 0 0 exe [11501072.183276] [ 695758] 0 695758 4786 20 86016 0 0 exe [11501072.191749] [ 695797] 0 695797 4151 21 28672 0 0 exe [11501072.200233] [ 695804] 0 695804 4151 21 28672 0 0 exe [11501072.208703] [ 695811] 0 695811 4151 21 28672 0 0 exe [11501072.217187] [ 695812] 0 695812 4151 21 28672 0 0 exe [11501072.225653] [ 695819] 0 695819 4404 21 69632 0 0 exe [11501072.234223] [ 695838] 0 695838 4151 21 36864 0 0 exe [11501072.242691] [ 695847] 0 695847 4151 21 28672 0 0 exe [11501072.251178] [ 695864] 0 695864 4151 21 28672 0 0 exe [11501072.259909] [ 695870] 0 695870 4151 21 28672 0 0 exe [11501072.268392] [ 695871] 0 695871 4151 21 28672 0 0 exe [11501072.276876] [ 695943] 0 695943 88839 52103 778240 0 0 exe [11501072.285349] [ 695980] 0 695980 88839 52103 778240 0 0 exe [11501072.293810] [ 695995] 0 695995 88839 52103 778240 0 0 exe [11501072.302384] [ 695996] 0 695996 88839 52103 778240 0 0 exe [11501072.310859] [ 695997] 0 695997 88839 52103 778240 0 0 exe [11501072.319336] [ 696020] 0 696020 4157 22 36864 0 0 exe [11501072.327811] [ 696036] 0 696036 88839 52103 778240 0 0 exe [11501072.336276] [ 696038] 0 696038 4157 22 36864 0 0 exe [11501072.344757] [ 696060] 0 696060 88839 52103 778240 0 0 exe [11501072.353250] [ 696084] 0 696084 88839 52103 778240 0 0 exe [11501072.361735] [ 696095] 0 696095 88839 52103 778240 0 0 exe [11501072.370230] [ 696103] 0 696103 104233 69238 839680 0 0 exe [11501072.378726] [ 696275] 0 696275 88839 52103 778240 0 0 exe [11501072.387204] [ 696333] 0 696333 88839 52103 778240 0 0 exe [11501072.395686] [ 696393] 0 696393 4404 21 69632 0 0 exe [11501072.404164] [ 696436] 0 696436 4163 23 28672 0 0 exe [11501072.412645] [ 696461] 0 696461 4145 20 28672 0 0 exe [11501072.421130] [ 696466] 0 696466 4145 20 28672 0 0 exe [11501072.429607] [ 696470] 0 696470 489161 10282 450560 0 0 image [11501072.438270] [ 696498] 0 696498 507594 10895 454656 0 0 image [11501072.447028] [ 696505] 0 696505 452039 10525 434176 0 0 exe [11501072.455512] [ 696507] 0 696507 1416535 124257 2584576 0 0 exe [11501072.463991] [ 696547] 0 696547 433414 10037 425984 0 0 exe [11501072.472469] [ 696548] 0 696548 1538667 123504 2686976 0 0 exe [11501072.480967] [ 696635] 0 696635 4157 22 28672 0 0 exe [11501072.489444] [ 696636] 0 696636 4157 22 28672 0 0 exe [11501072.497920] [ 696656] 0 696656 4133 17 28672 0 0 exe [11501072.506399] [ 696661] 0 696661 4133 17 28672 0 0 exe [11501072.515326] [ 696679] 0 696679 1 1 12288 0 0 exe [11501072.523823] [ 696693] 0 696693 32449 2940 253952 0 0 exe [11501072.532306] [ 696702] 0 696702 32449 2940 253952 0 0 exe [11501072.540782] [ 696707] 0 696707 28446 2822 233472 0 0 exe [11501072.549262] [ 696718] 0 696718 32449 2940 253952 0 0 exe [11501072.557726] [ 696722] 0 696722 32449 2940 253952 0 0 exe [11501072.566201] [ 696802] 0 696802 4151 21 28672 0 0 exe [11501072.574684] [ 696803] 0 696803 4151 21 28672 0 0 exe [11501072.583169] [ 696821] 0 696821 4151 21 28672 0 0 exe [11501072.591719] [ 696917] 0 696917 1 1 12288 0 0 exe [11501072.600184] [ 696921] 0 696921 1 1 12288 0 0 exe [11501072.608665] [ 696925] 0 696925 1 1 12288 0 0 exe [11501072.617158] [ 696929] 0 696929 1 1 12288 0 0 exe [11501072.625652] [ 696933] 0 696933 1 1 12288 0 0 exe [11501072.634142] [ 696937] 0 696937 1 1 12288 0 0 exe [11501072.642633] [ 696941] 0 696941 1 1 12288 0 0 exe [11501072.651137] [ 697182] 0 697182 103587 69076 823296 0 0 exe [11501072.659652] [ 697183] 0 697183 103587 69076 823296 0 0 exe [11501072.668168] [ 697279] 0 697279 4157 22 28672 0 0 exe [11501072.676657] [ 697280] 0 697280 4157 22 28672 0 0 exe [11501072.685268] [ 697555] 0 697555 4157 22 36864 0 0 exe [11501072.693761] [ 697556] 0 697556 4157 22 36864 0 0 exe [11501072.703130] [ 697560] 0 697560 4157 22 36864 0 0 exe [11501072.711624] [ 697563] 0 697563 4145 20 28672 0 0 exe [11501072.720114] [ 697564] 0 697564 4151 21 28672 0 0 exe [11501072.728604] [ 697565] 0 697565 7905 22 98304 0 0 exe [11501072.737124] [ 697566] 0 697566 4145 20 28672 0 0 exe [11501072.745624] [ 697567] 0 697567 4151 21 28672 0 0 exe [11501072.754120] [ 697568] 0 697568 4151 21 28672 0 0 exe [11501072.762608] [ 697570] 0 697570 4151 21 28672 0 0 exe [11501072.771089] [ 697569] 0 697569 4157 22 28672 0 0 exe [11501072.779587] [ 697571] 0 697571 4467 18 69632 0 0 exe [11501072.788078] [ 697572] 0 697572 4145 20 28672 0 0 exe [11501072.796555] [ 697573] 0 697573 4151 21 28672 0 0 exe [11501072.805034] [ 697574] 0 697574 4133 29 28672 0 0 exe [11501072.813534] [ 697575] 0 697575 4151 21 28672 0 0 exe [11501072.822022] [ 697576] 0 697576 4133 18 28672 0 0 exe [11501072.830498] [ 697577] 0 697577 4145 20 28672 0 0 exe [11501072.838972] [ 697579] 0 697579 4467 18 69632 0 0 exe [11501072.847538] [ 697581] 0 697581 4151 21 28672 0 0 exe [11501072.856018] [ 697584] 0 697584 4133 29 28672 0 0 exe [11501072.864509] [ 697580] 0 697580 4151 21 28672 0 0 exe [11501072.872987] [ 697585] 0 697585 4151 21 28672 0 0 exe [11501072.881464] [ 697589] 0 697589 4151 21 28672 0 0 exe [11501072.890302] [ 697587] 0 697587 4145 20 28672 0 0 exe [11501072.898790] [ 697591] 0 697591 4151 21 28672 0 0 exe [11501072.907274] [ 697593] 0 697593 7905 22 98304 0 0 exe [11501072.915755] [ 697595] 0 697595 4133 27 28672 0 0 exe [11501072.924235] [ 697596] 0 697596 4145 20 28672 0 0 exe [11501072.933255] [ 697598] 0 697598 4133 18 28672 0 0 exe [11501072.941732] [ 697602] 0 697602 4151 21 28672 0 0 exe [11501072.950208] [ 697605] 0 697605 4467 18 69632 0 0 exe [11501072.958693] [ 697607] 0 697607 4133 27 28672 0 0 exe [11501072.967169] [ 697608] 0 697608 4133 18 28672 0 0 exe [11501072.975649] [ 697609] 0 697609 4151 21 28672 0 0 exe [11501072.984128] [ 697610] 0 697610 4145 20 28672 0 0 exe [11501072.992607] [ 697611] 0 697611 4212 21 53248 0 0 exe [11501073.001082] [ 697612] 0 697612 4467 18 69632 0 0 exe [11501073.009559] [ 697613] 0 697613 4467 18 69632 0 0 exe [11501073.018029] [ 697615] 0 697615 4133 18 28672 0 0 exe [11501073.026761] [ 697614] 0 697614 4151 21 28672 0 0 exe [11501073.035236] [ 697618] 0 697618 4151 21 28672 0 0 exe [11501073.043717] [ 697619] 0 697619 4151 21 28672 0 0 exe [11501073.052193] [ 697621] 0 697621 4133 18 28672 0 0 exe [11501073.060673] [ 697622] 0 697622 4494 16 57344 0 0 exe [11501073.069150] [ 697625] 0 697625 4151 21 28672 0 0 exe [11501073.077627] [ 697626] 0 697626 4151 21 28672 0 0 exe [11501073.086109] [ 697627] 0 697627 4133 18 28672 0 0 exe [11501073.094586] [ 697628] 0 697628 4151 21 28672 0 0 exe [11501073.103067] [ 697629] 0 697629 4151 21 28672 0 0 exe [11501073.111545] [ 697631] 0 697631 4494 16 57344 0 0 exe [11501073.120044] [ 697639] 0 697639 4151 21 28672 0 0 exe [11501073.128522] [ 697646] 0 697646 4151 21 28672 0 0 exe [11501073.137005] [ 697647] 0 697647 4151 21 28672 0 0 exe [11501073.145485] [ 697648] 0 697648 4133 18 28672 0 0 exe [11501073.153969] [ 697649] 0 697649 4212 21 53248 0 0 exe [11501073.162471] [ 697650] 0 697650 4467 18 69632 0 0 exe [11501073.170972] [ 697651] 0 697651 4145 20 28672 0 0 exe [11501073.179452] [ 697653] 0 697653 4133 18 28672 0 0 exe [11501073.187944] [ 697654] 0 697654 4151 21 28672 0 0 exe [11501073.196433] [ 697652] 0 697652 105692 71130 790528 0 0 exe [11501073.204930] [ 697655] 0 697655 4485 21 69632 0 0 exe [11501073.213429] [ 697656] 0 697656 4133 18 28672 0 0 exe [11501073.221928] [ 697657] 0 697657 4151 21 28672 0 0 exe [11501073.230406] [ 697658] 0 697658 4145 20 28672 0 0 exe [11501073.238880] [ 697659] 0 697659 4133 25 28672 0 0 exe [11501073.247354] [ 697660] 0 697660 4151 21 28672 0 0 exe [11501073.255830] [ 697661] 0 697661 4133 18 28672 0 0 exe [11501073.264322] [ 697662] 0 697662 4133 18 28672 0 0 exe [11501073.272796] [ 697663] 0 697663 4494 16 57344 0 0 exe [11501073.281278] [ 697664] 0 697664 4151 21 28672 0 0 exe [11501073.289756] [ 697665] 0 697665 4485 21 69632 0 0 exe [11501073.298231] [ 697666] 0 697666 4151 21 28672 0 0 exe [11501073.306709] [ 697667] 0 697667 4133 25 28672 0 0 exe [11501073.315211] [ 697668] 0 697668 4151 21 28672 0 0 exe [11501073.323808] [ 697669] 0 697669 4151 21 28672 0 0 exe [11501073.332296] [ 697670] 0 697670 4151 21 28672 0 0 exe [11501073.340782] [ 697671] 0 697671 4494 16 57344 0 0 exe [11501073.349261] [ 697672] 0 697672 4151 21 28672 0 0 exe [11501073.357739] [ 697673] 0 697673 4151 21 28672 0 0 exe [11501073.366213] [ 697674] 0 697674 4133 18 28672 0 0 exe [11501073.374697] [ 697675] 0 697675 4145 20 28672 0 0 exe [11501073.383164] [ 697676] 0 697676 4133 18 28672 0 0 exe [11501073.391638] [ 697677] 0 697677 4151 21 28672 0 0 exe [11501073.400190] [ 697678] 0 697678 4133 18 28672 0 0 exe [11501073.408745] [ 697680] 0 697680 4157 22 36864 0 0 exe [11501073.417245] [ 697684] 0 697684 4145 20 28672 0 0 exe [11501073.425715] [ 697687] 0 697687 105692 71130 790528 0 0 exe [11501073.434217] [ 697688] 0 697688 105692 71130 790528 0 0 exe [11501073.442694] [ 697689] 0 697689 4145 20 28672 0 0 exe [11501073.451172] [ 697690] 0 697690 105692 71130 790528 0 0 exe [11501073.459663] [ 697692] 0 697692 4151 21 28672 0 0 exe [11501073.468150] [ 697700] 0 697700 4151 21 28672 0 0 exe [11501073.476637] [ 697742] 0 697742 105692 71130 790528 0 0 exe [11501073.485125] [ 697746] 0 697746 105692 71130 790528 0 0 exe [11501073.493610] [ 697748] 0 697748 105692 71130 790528 0 0 exe [11501073.502092] [ 697788] 0 697788 4151 21 28672 0 0 exe [11501073.510575] [ 697800] 0 697800 105692 71130 790528 0 0 exe [11501073.519068] [ 697809] 0 697809 4157 22 36864 0 0 exe [11501073.527557] [ 697894] 0 697894 105692 71130 790528 0 0 exe [11501073.536044] [ 698176] 0 698176 4157 22 28672 0 0 exe [11501073.544529] [ 698330] 0 698330 4151 21 28672 0 0 exe [11501073.553011] [ 698352] 0 698352 105692 71130 790528 0 0 exe [11501073.561491] [ 698353] 0 698353 105692 71130 790528 0 0 exe [11501073.569970] [ 698375] 0 698375 4151 21 28672 0 0 exe [11501073.578473] [ 698376] 0 698376 105692 71130 790528 0 0 exe [11501073.586972] [ 698399] 0 698399 105692 71130 790528 0 0 exe [11501073.595471] [ 698401] 0 698401 104233 69238 839680 0 0 exe [11501073.603956] [ 698403] 0 698403 104233 69238 839680 0 0 exe [11501073.612454] [ 698415] 0 698415 105692 71130 790528 0 0 exe [11501073.620946] [ 698431] 0 698431 104233 69238 839680 0 0 exe [11501073.629448] [ 698432] 0 698432 104233 69238 839680 0 0 exe [11501073.637929] [ 698457] 0 698457 4133 16 28672 0 0 exe [11501073.646407] [ 698458] 0 698458 4133 16 28672 0 0 exe [11501073.654885] [ 698459] 0 698459 6351 20 98304 0 0 exe [11501073.663360] [ 698461] 0 698461 6351 20 98304 0 0 exe [11501073.671837] [ 698462] 0 698462 4145 20 28672 0 0 exe [11501073.680324] [ 698463] 0 698463 4145 20 28672 0 0 exe [11501073.688814] [ 698464] 0 698464 4133 16 28672 0 0 exe [11501073.697833] [ 698465] 0 698465 4133 16 28672 0 0 exe [11501073.706327] [ 698466] 0 698466 4133 16 28672 0 0 exe [11501073.714821] [ 698467] 0 698467 4133 16 28672 0 0 exe [11501073.723308] [ 698468] 0 698468 4133 16 28672 0 0 exe [11501073.731791] [ 698469] 0 698469 4133 16 28672 0 0 exe [11501073.740362] [ 698470] 0 698470 4133 16 28672 0 0 exe [11501073.748854] [ 698471] 0 698471 4133 16 28672 0 0 exe [11501073.757338] [ 698472] 0 698472 4133 16 28672 0 0 exe [11501073.765805] [ 698473] 0 698473 4133 16 28672 0 0 exe [11501073.774359] [ 698475] 0 698475 6351 20 98304 0 0 exe [11501073.782842] [ 698476] 0 698476 4145 20 28672 0 0 exe [11501073.791325] [ 698480] 0 698480 105692 71130 790528 0 0 exe [11501073.799786] [ 698489] 0 698489 6351 20 98304 0 0 exe [11501073.808273] [ 698516] 0 698516 4145 20 28672 0 0 exe [11501073.816743] [ 698857] 0 698857 103587 69076 823296 0 0 exe [11501073.825219] [ 698871] 0 698871 103587 69076 823296 0 0 exe [11501073.833698] [ 698957] 0 698957 6284 21 94208 0 0 exe [11501073.842185] [ 699027] 0 699027 4506 18 57344 0 0 exe [11501073.850754] [ 699028] 0 699028 4506 18 57344 0 0 exe [11501073.859245] [ 699031] 0 699031 4485 21 69632 0 0 exe [11501073.867705] [ 699035] 0 699035 4485 21 69632 0 0 exe [11501073.876184] [ 699064] 0 699064 4151 21 28672 0 0 exe [11501073.884654] [ 699115] 0 699115 415237 9183 417792 0 0 image [11501073.893298] [ 699116] 0 699116 4485 21 69632 0 0 exe [11501073.901769] [ 699133] 0 699133 470472 10223 442368 0 0 exe [11501073.910239] [ 699134] 0 699134 900916 18177 794624 0 0 exe [11501073.918702] [ 699187] 0 699187 4133 17 28672 0 0 exe [11501073.927168] [ 699190] 0 699190 4133 17 28672 0 0 exe [11501073.935629] [ 699203] 0 699203 32774 2866 253952 0 0 exe [11501073.944100] [ 699204] 0 699204 32774 2866 253952 0 0 exe [11501073.952569] [ 699208] 0 699208 32774 2866 253952 0 0 exe [11501073.961063] [ 699209] 0 699209 32774 2866 253952 0 0 exe [11501073.969540] [ 699210] 0 699210 32774 2866 253952 0 0 exe [11501073.978100] [ 699224] 0 699224 470440 9076 442368 0 0 image [11501073.986744] [ 699235] 0 699235 23048 7202 233472 0 0 exe [11501073.995210] [ 699236] 0 699236 23048 7202 233472 0 0 exe [11501074.003668] [ 699237] 0 699237 23048 7202 233472 0 0 exe [11501074.012134] [ 699240] 0 699240 23048 7202 233472 0 0 exe [11501074.020622] [ 699241] 0 699241 23048 7202 233472 0 0 exe [11501074.029618] [ 699244] 0 699244 23048 7202 233472 0 0 exe [11501074.038080] [ 699245] 0 699245 23048 7202 233472 0 0 exe [11501074.046544] [ 699253] 0 699253 4345 18 81920 0 0 exe [11501074.055011] [ 699254] 0 699254 4345 18 81920 0 0 exe [11501074.063563] [ 699260] 0 699260 4653 18 86016 0 0 exe [11501074.072031] [ 699262] 0 699262 4653 18 86016 0 0 exe [11501074.080495] [ 699357] 0 699357 6107 19 94208 0 0 exe [11501074.088965] [ 699358] 0 699358 6107 19 94208 0 0 exe [11501074.097441] [ 699359] 0 699359 4151 21 36864 0 0 exe [11501074.105901] [ 699363] 0 699363 6107 19 94208 0 0 exe [11501074.114362] [ 699381] 0 699381 452167 10237 421888 0 0 image [11501074.122998] [ 699389] 0 699389 433446 9942 421888 0 0 image [11501074.131719] [ 699421] 0 699421 433414 9787 425984 0 0 exe [11501074.140196] [ 699422] 0 699422 949114 19896 831488 0 0 exe [11501074.148662] [ 699435] 0 699435 18543 6580 212992 0 0 exe [11501074.157149] [ 699485] 0 699485 539 1 49152 0 0 exe [11501074.165708] [ 699496] 0 699496 602 1 61440 0 0 exe [11501074.174280] [ 699507] 0 699507 1 1 12288 0 0 exe [11501074.183458] [ 699515] 0 699515 37102 20194 368640 0 0 exe [11501074.191928] [ 699517] 0 699517 37102 20194 368640 0 0 exe [11501074.200393] [ 699518] 0 699518 37102 20194 368640 0 0 exe [11501074.208856] [ 699533] 0 699533 28300 2799 237568 0 0 exe [11501074.217325] [ 699546] 0 699546 1 1 12288 0 0 exe [11501074.225875] [ 699705] 0 699705 4151 21 28672 0 0 exe [11501074.234353] [ 699710] 0 699710 4151 21 28672 0 0 exe [11501074.244208] [ 699802] 0 699802 4151 21 28672 0 0 exe [11501074.252763] [ 699819] 0 699819 103587 69076 823296 0 0 exe [11501074.261247] [ 699822] 0 699822 4151 21 28672 0 0 exe [11501074.269723] [ 699824] 0 699824 4151 21 28672 0 0 exe [11501074.278198] [ 699858] 0 699858 4157 22 36864 0 0 exe [11501074.286674] [ 699966] 0 699966 4157 22 28672 0 0 exe [11501074.295148] [ 699967] 0 699967 4151 21 28672 0 0 exe [11501074.303616] [ 699968] 0 699968 4151 21 28672 0 0 exe [11501074.312083] [ 699972] 0 699972 4151 21 28672 0 0 exe [11501074.320552] [ 700153] 0 700153 4169 24 28672 0 0 exe [11501074.329029] [ 700235] 0 700235 4163 23 28672 0 0 exe [11501074.337492] [ 700396] 0 700396 4151 21 28672 0 0 exe [11501074.345987] [ 700397] 0 700397 4151 21 28672 0 0 exe [11501074.354450] [ 700422] 0 700422 4151 21 28672 0 0 exe [11501074.362915] [ 700546] 0 700546 1 1 12288 0 0 exe [11501074.371382] [ 700548] 0 700548 1 1 12288 0 0 exe [11501074.379851] [ 700556] 0 700556 1 1 12288 0 0 exe [11501074.388325] [ 700558] 0 700558 1 1 12288 0 0 exe [11501074.396796] [ 700564] 0 700564 1 1 12288 0 0 exe [11501074.405901] [ 700722] 0 700722 4157 22 28672 0 0 exe [11501074.414366] [ 700723] 0 700723 4157 22 28672 0 0 exe [11501074.422828] [ 700753] 0 700753 4151 19 28672 0 0 exe [11501074.431307] [ 701152] 0 701152 4157 22 28672 0 0 exe [11501074.439771] [ 701201] 0 701201 4157 22 28672 0 0 exe [11501074.448323] [ 701214] 0 701214 4151 21 28672 0 0 exe [11501074.456788] [ 701237] 0 701237 4151 21 28672 0 0 exe [11501074.465261] [ 701455] 0 701455 4163 23 28672 0 0 exe [11501074.473726] [ 701527] 0 701527 88839 52103 778240 0 0 exe [11501074.482203] [ 701529] 0 701529 88839 52103 778240 0 0 exe [11501074.490669] [ 701530] 0 701530 88839 52103 778240 0 0 exe [11501074.499166] [ 702117] 0 702117 4545 21 81920 0 0 exe [11501074.507653] [ 702193] 0 702193 4157 22 28672 0 0 exe [11501074.516119] [ 702215] 0 702215 4145 20 28672 0 0 exe [11501074.524598] [ 702249] 0 702249 4145 20 28672 0 0 exe [11501074.533064] [ 702372] 0 702372 4151 21 28672 0 0 exe [11501074.541536] [ 702375] 0 702375 4151 21 28672 0 0 exe [11501074.550002] [ 702376] 0 702376 4151 21 28672 0 0 exe [11501074.558463] [ 702387] 0 702387 4151 21 28672 0 0 exe [11501074.566929] [ 702436] 0 702436 4145 20 36864 0 0 exe [11501074.575391] [ 702438] 0 702438 4145 20 36864 0 0 exe [11501074.584030] [ 702528] 0 702528 4151 21 28672 0 0 exe [11501074.592500] [ 703105] 0 703105 4157 22 28672 0 0 exe [11501074.600976] [ 703107] 0 703107 4151 21 28672 0 0 exe [11501074.610231] [ 703110] 0 703110 4151 21 28672 0 0 exe [11501074.618708] [ 703111] 0 703111 4151 21 28672 0 0 exe [11501074.627257] [ 703112] 0 703112 4151 21 28672 0 0 exe [11501074.635813] [ 703160] 0 703160 4302 22 73728 0 0 exe [11501074.644275] [ 703168] 0 703168 4163 23 28672 0 0 exe [11501074.652748] [ 703170] 0 703170 4163 23 28672 0 0 exe [11501074.661218] [ 703185] 0 703185 4157 22 28672 0 0 exe [11501074.669686] [ 703349] 65534 703349 1 1 12288 0 0 exe [11501074.678152] [ 703392] 0 703392 4545 21 81920 0 0 exe [11501074.686633] [ 703465] 0 703465 4551 22 81920 0 0 exe [11501074.695143] [ 703466] 0 703466 4551 22 81920 0 0 exe [11501074.703687] [ 703474] 0 703474 4151 21 28672 0 0 exe [11501074.712280] [ 703483] 0 703483 4551 22 81920 0 0 exe [11501074.720767] [ 703492] 0 703492 4157 22 28672 0 0 exe [11501074.729255] [ 703500] 0 703500 4302 22 73728 0 0 exe [11501074.737721] [ 703643] 0 703643 105692 71130 790528 0 0 exe [11501074.746186] [ 703644] 0 703644 105692 71130 790528 0 0 exe [11501074.754648] [ 703645] 0 703645 105692 71130 790528 0 0 exe [11501074.763119] [ 703646] 0 703646 105692 71130 790528 0 0 exe [11501074.771605] [ 703724] 0 703724 4551 22 81920 0 0 exe [11501074.780768] [ 703827] 0 703827 4545 21 81920 0 0 exe [11501074.789252] [ 703887] 0 703887 36822 20338 352256 0 0 exe [11501074.797718] [ 704040] 0 704040 4163 23 28672 0 0 exe [11501074.806651] [ 704065] 0 704065 4151 21 36864 0 0 exe [11501074.815133] [ 704067] 0 704067 4151 21 36864 0 0 exe [11501074.823625] [ 704078] 0 704078 4151 21 36864 0 0 exe [11501074.832115] [ 704112] 0 704112 4151 21 36864 0 0 exe [11501074.840582] [ 704113] 0 704113 4151 21 36864 0 0 exe [11501074.849047] [ 704140] 0 704140 104233 69238 839680 0 0 exe [11501074.857529] [ 704178] 0 704178 4145 20 36864 0 0 exe [11501074.866000] [ 704179] 0 704179 4145 20 36864 0 0 exe [11501074.874468] [ 704291] 0 704291 4151 21 28672 0 0 exe [11501074.882949] [ 704292] 0 704292 4151 21 28672 0 0 exe [11501074.891417] [ 704295] 0 704295 4151 21 28672 0 0 exe [11501074.899896] [ 704361] 0 704361 4145 20 36864 0 0 exe [11501074.908364] [ 704362] 0 704362 4145 20 36864 0 0 exe [11501074.916843] [ 704426] 0 704426 4151 21 36864 0 0 exe [11501074.925320] [ 704430] 0 704430 4163 23 28672 0 0 exe [11501074.933795] [ 704490] 0 704490 4145 20 36864 0 0 exe [11501074.942351] [ 704491] 0 704491 4145 20 36864 0 0 exe [11501074.950819] [ 704492] 0 704492 4151 21 36864 0 0 exe [11501074.959315] [ 704494] 0 704494 1 1 12288 0 0 exe [11501074.967791] [ 704572] 0 704572 4212 21 53248 0 0 exe [11501074.976264] [ 704573] 0 704573 4212 21 53248 0 0 exe [11501074.984738] [ 704575] 0 704575 4151 21 36864 0 0 exe [11501074.993220] [ 704576] 0 704576 4151 21 36864 0 0 exe [11501075.001683] [ 704577] 0 704577 4212 21 53248 0 0 exe [11501075.010148] [ 704578] 0 704578 4539 20 81920 0 0 exe [11501075.018633] [ 704580] 0 704580 4151 21 36864 0 0 exe [11501075.027108] [ 704581] 0 704581 4151 21 36864 0 0 exe [11501075.035667] [ 704585] 0 704585 4559 21 73728 0 0 exe [11501075.044137] [ 704586] 0 704586 4559 21 73728 0 0 exe [11501075.052617] [ 704768] 0 704768 4151 21 36864 0 0 exe [11501075.061089] [ 704936] 0 704936 4139 19 36864 0 0 exe [11501075.069554] [ 704939] 0 704939 4151 21 36864 0 0 exe [11501075.078104] [ 704950] 0 704950 4163 23 28672 0 0 exe [11501075.086574] [ 705275] 0 705275 103587 69076 823296 0 0 exe [11501075.095037] [ 705276] 0 705276 103587 69076 823296 0 0 exe [11501075.103498] [ 705277] 0 705277 103587 69076 823296 0 0 exe [11501075.111968] [ 705324] 0 705324 4151 21 36864 0 0 exe [11501075.120435] [ 705328] 0 705328 48587 44044 438272 0 0 exe [11501075.128918] [ 705329] 0 705329 48587 44044 438272 0 0 exe [11501075.137479] [ 705330] 0 705330 48587 44044 438272 0 0 exe [11501075.145964] [ 705359] 65534 705359 1 1 12288 0 0 exe [11501075.154439] [ 705371] 0 705371 4175 25 28672 0 0 exe [11501075.162901] [ 705372] 0 705372 4175 25 28672 0 0 exe [11501075.171360] [ 705392] 0 705392 4151 21 36864 0 0 exe [11501075.179831] [ 705600] 0 705600 4151 21 36864 0 0 exe [11501075.188306] [ 705604] 0 705604 103587 69076 823296 0 0 exe [11501075.196773] [ 705605] 0 705605 103587 69076 823296 0 0 exe [11501075.205246] [ 705791] 0 705791 48587 44044 438272 0 0 exe [11501075.213839] [ 705792] 0 705792 48587 44044 438272 0 0 exe [11501075.222311] [ 705804] 0 705804 4151 21 28672 0 0 exe [11501075.230772] [ 705812] 0 705812 1 1 12288 0 0 exe [11501075.239250] [ 705845] 0 705845 4157 22 28672 0 0 exe [11501075.247712] [ 705846] 0 705846 4145 18 28672 0 0 exe [11501075.256198] [ 705847] 0 705847 4157 22 28672 0 0 exe [11501075.264674] [ 705848] 0 705848 4133 16 28672 0 0 exe [11501075.273237] [ 705849] 0 705849 4133 16 28672 0 0 exe [11501075.281707] [ 705850] 0 705850 4133 16 28672 0 0 exe [11501075.290179] [ 705852] 0 705852 4145 18 28672 0 0 exe [11501075.298651] [ 705851] 0 705851 4133 16 28672 0 0 exe [11501075.307127] [ 705853] 0 705853 4133 16 28672 0 0 exe [11501075.315604] [ 705854] 0 705854 4133 16 28672 0 0 exe [11501075.324068] [ 705856] 0 705856 4133 16 28672 0 0 exe [11501075.332531] [ 705855] 0 705855 4133 16 28672 0 0 exe [11501075.340992] [ 705857] 0 705857 4133 16 28672 0 0 exe [11501075.349515] [ 705858] 0 705858 4133 16 28672 0 0 exe [11501075.358010] [ 705859] 0 705859 4133 16 28672 0 0 exe [11501075.366582] [ 705860] 0 705860 4133 16 28672 0 0 exe [11501075.375147] [ 705861] 0 705861 4133 16 28672 0 0 exe [11501075.383617] [ 705864] 0 705864 4133 16 28672 0 0 exe [11501075.392115] [ 705862] 0 705862 4133 16 28672 0 0 exe [11501075.400598] [ 705863] 0 705863 4145 18 28672 0 0 exe [11501075.409068] [ 705865] 0 705865 4133 16 28672 0 0 exe [11501075.417621] [ 705866] 0 705866 4157 22 28672 0 0 exe [11501075.426078] [ 705867] 0 705867 4133 16 28672 0 0 exe [11501075.434542] [ 705868] 0 705868 4133 16 28672 0 0 exe [11501075.443000] [ 705869] 0 705869 4133 16 28672 0 0 exe [11501075.451497] [ 705870] 0 705870 4133 16 28672 0 0 exe [11501075.460054] [ 705871] 0 705871 4157 22 28672 0 0 exe [11501075.468528] [ 705872] 0 705872 4145 18 28672 0 0 exe [11501075.477007] [ 705873] 0 705873 4133 16 28672 0 0 exe [11501075.485482] [ 705874] 0 705874 4133 16 28672 0 0 exe [11501075.493944] [ 705875] 0 705875 4133 16 28672 0 0 exe [11501075.502500] [ 705876] 0 705876 4133 16 28672 0 0 exe [11501075.511057] [ 705877] 0 705877 4133 16 28672 0 0 exe [11501075.519615] [ 705878] 0 705878 4157 22 28672 0 0 exe [11501075.528081] [ 705879] 0 705879 4133 16 28672 0 0 exe [11501075.536553] [ 705880] 0 705880 4157 22 28672 0 0 exe [11501075.545019] [ 705881] 0 705881 4133 16 28672 0 0 exe [11501075.553489] [ 705882] 0 705882 4133 16 28672 0 0 exe [11501075.561959] [ 705883] 0 705883 4133 16 28672 0 0 exe [11501075.570422] [ 705884] 0 705884 4133 16 28672 0 0 exe [11501075.578897] [ 705885] 0 705885 4133 16 28672 0 0 exe [11501075.587374] [ 705886] 0 705886 4133 16 28672 0 0 exe [11501075.595834] [ 705887] 0 705887 4163 23 28672 0 0 exe [11501075.604297] [ 705888] 0 705888 4133 16 28672 0 0 exe [11501075.612760] [ 705889] 0 705889 4133 16 28672 0 0 exe [11501075.621229] [ 705890] 0 705890 4133 16 28672 0 0 exe [11501075.629697] [ 705891] 0 705891 4133 16 28672 0 0 exe [11501075.638189] [ 705892] 0 705892 4133 16 28672 0 0 exe [11501075.646648] [ 705893] 0 705893 4133 16 28672 0 0 exe [11501075.655108] [ 705894] 0 705894 4133 16 28672 0 0 exe [11501075.663568] [ 705895] 0 705895 4163 23 28672 0 0 exe [11501075.672037] [ 705896] 0 705896 4133 16 28672 0 0 exe [11501075.680508] [ 705897] 0 705897 4133 16 28672 0 0 exe [11501075.688999] [ 705898] 0 705898 4133 16 28672 0 0 exe [11501075.697569] [ 705899] 0 705899 4133 16 28672 0 0 exe [11501075.706040] [ 705900] 0 705900 4133 16 28672 0 0 exe [11501075.714504] [ 705901] 0 705901 4133 16 28672 0 0 exe [11501075.722963] [ 705903] 0 705903 4133 16 28672 0 0 exe [11501075.731426] [ 705902] 0 705902 4133 16 28672 0 0 exe [11501075.739896] [ 705904] 0 705904 4133 16 28672 0 0 exe [11501075.748453] [ 705905] 0 705905 4133 16 28672 0 0 exe [11501075.757000] [ 705906] 0 705906 4133 16 28672 0 0 exe [11501075.765475] [ 705907] 0 705907 4133 16 28672 0 0 exe [11501075.773941] [ 705908] 0 705908 4163 23 28672 0 0 exe [11501075.782405] [ 705910] 0 705910 4163 23 28672 0 0 exe [11501075.790867] [ 705909] 0 705909 4169 24 28672 0 0 exe [11501075.799331] [ 705911] 0 705911 4133 16 28672 0 0 exe [11501075.807797] [ 705912] 0 705912 6981 22 98304 0 0 exe [11501075.816262] [ 705913] 0 705913 4133 16 28672 0 0 exe [11501075.824735] [ 705914] 0 705914 4133 16 28672 0 0 exe [11501075.833215] [ 705915] 0 705915 4133 16 28672 0 0 exe [11501075.841684] [ 705916] 0 705916 6981 22 98304 0 0 exe [11501075.850158] [ 705917] 0 705917 4169 24 28672 0 0 exe [11501075.858626] [ 705918] 0 705918 4133 16 28672 0 0 exe [11501075.867086] [ 705919] 0 705919 4157 22 28672 0 0 exe [11501075.875551] [ 705920] 0 705920 4163 23 28672 0 0 exe [11501075.884047] [ 705921] 0 705921 4157 22 28672 0 0 exe [11501075.892515] [ 705923] 0 705923 4163 23 28672 0 0 exe [11501075.900985] [ 705924] 0 705924 4157 22 28672 0 0 exe [11501075.909481] [ 705925] 0 705925 4163 23 28672 0 0 exe [11501075.917945] [ 705926] 0 705926 4157 22 28672 0 0 exe [11501075.926411] [ 705943] 0 705943 4157 22 28672 0 0 exe [11501075.934875] [ 705972] 0 705972 4163 23 28672 0 0 exe [11501075.943333] [ 705973] 0 705973 4163 23 28672 0 0 exe [11501075.951886] [ 705974] 0 705974 4163 23 28672 0 0 exe [11501075.960346] [ 705975] 0 705975 4163 23 28672 0 0 exe [11501075.968896] [ 705976] 0 705976 4157 22 28672 0 0 exe [11501075.977367] [ 705978] 0 705978 4157 22 28672 0 0 exe [11501075.985836] [ 706024] 0 706024 4163 23 28672 0 0 exe [11501075.994306] [ 706108] 0 706108 4169 24 28672 0 0 exe [11501076.002780] [ 706121] 0 706121 4151 21 36864 0 0 exe [11501076.011260] [ 706122] 0 706122 4151 21 36864 0 0 exe [11501076.019735] [ 706125] 0 706125 4151 21 36864 0 0 exe [11501076.028198] [ 706126] 0 706126 4151 21 36864 0 0 exe [11501076.036743] [ 706127] 0 706127 4151 21 36864 0 0 exe [11501076.045212] [ 706131] 0 706131 4169 24 28672 0 0 exe [11501076.053680] [ 706164] 0 706164 4169 24 28672 0 0 exe [11501076.062152] [ 706165] 0 706165 4169 24 28672 0 0 exe [11501076.070702] [ 706166] 0 706166 4169 24 28672 0 0 exe [11501076.079177] [ 706167] 0 706167 4151 21 28672 0 0 exe [11501076.087640] [ 706175] 0 706175 4151 21 28672 0 0 exe [11501076.096108] [ 706176] 0 706176 4559 21 53248 0 0 exe [11501076.104580] [ 706213] 0 706213 4139 19 28672 0 0 exe [11501076.113044] [ 706295] 0 706295 4163 23 28672 0 0 exe [11501076.121521] [ 706311] 0 706311 4485 21 69632 0 0 exe [11501076.130006] [ 706390] 0 706390 4145 20 28672 0 0 exe [11501076.138476] [ 706403] 0 706403 4163 23 28672 0 0 exe [11501076.146937] [ 706418] 0 706418 6806 23 98304 0 0 exe [11501076.155417] [ 706419] 0 706419 6806 23 98304 0 0 exe [11501076.163883] [ 706452] 0 706452 4139 19 28672 0 0 exe [11501076.172357] [ 706453] 0 706453 4151 21 28672 0 0 exe [11501076.180828] [ 706454] 0 706454 4151 21 28672 0 0 exe [11501076.189296] [ 706471] 0 706471 4551 22 81920 0 0 exe [11501076.197760] [ 706472] 0 706472 4151 21 28672 0 0 exe [11501076.206224] [ 706474] 0 706474 4151 21 28672 0 0 exe [11501076.214685] [ 706478] 0 706478 4151 21 28672 0 0 exe [11501076.223157] [ 706523] 0 706523 4145 20 28672 0 0 exe [11501076.231641] [ 706524] 0 706524 4145 20 28672 0 0 exe [11501076.240106] [ 706700] 0 706700 4163 23 28672 0 0 exe [11501076.248571] [ 706810] 0 706810 4151 21 28672 0 0 exe [11501076.257045] [ 706812] 0 706812 4163 23 28672 0 0 exe [11501076.265519] [ 706834] 0 706834 4151 21 28672 0 0 exe [11501076.273979] [ 706835] 0 706835 4151 21 28672 0 0 exe [11501076.282441] [ 706851] 0 706851 4157 22 36864 0 0 exe [11501076.290900] [ 706852] 0 706852 4157 22 36864 0 0 exe [11501076.299455] [ 706856] 0 706856 4151 21 28672 0 0 exe [11501076.308007] [ 706857] 0 706857 4157 22 36864 0 0 exe [11501076.316475] [ 706927] 0 706927 4145 19 36864 0 0 exe [11501076.324941] [ 706928] 0 706928 4151 21 36864 0 0 exe [11501076.333508] [ 706985] 0 706985 4151 21 36864 0 0 exe [11501076.341995] [ 707090] 0 707090 4151 21 28672 0 0 exe [11501076.350447] rcu: INFO: rcu_sched self-detected stall on CPU [11501076.350450] rcu: 24-....: (2449 ticks this GP) idle=fd2/1/0x4000000000000000 softirq=1207888855/1207888855 fqs=2415 [11501076.350453] (t=5250 jiffies g=2095195277 q=7476) [11501076.350455] NMI backtrace for cpu 24 [11501076.350457] CPU: 24 PID: 653819 Comm: exe Tainted: G L 5.9.0-0.bpo.5-cloud-amd64 #1 Debian 5.9.15-1~bpo10+1 [11501076.350458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [11501076.350458] Call Trace: [11501076.350461] [11501076.350467] dump_stack+0x6d/0x88 [11501076.350469] nmi_cpu_backtrace.cold.8+0x13/0x50 [11501076.350471] ? lapic_can_unplug_cpu+0x80/0x80 [11501076.350473] nmi_trigger_cpumask_backtrace+0xf9/0x100 [11501076.350476] rcu_dump_cpu_stacks+0xab/0xd9 [11501076.350477] rcu_sched_clock_irq.cold.94+0x109/0x365 [11501076.350480] ? trigger_load_balance+0x5c/0x220 [11501076.350482] ? tick_sched_do_timer+0x60/0x60 [11501076.350483] update_process_times+0x24/0x50 [11501076.350485] tick_sched_handle.isra.22+0x1f/0x60 [11501076.350486] tick_sched_timer+0x65/0x80 [11501076.350487] __hrtimer_run_queues+0x100/0x280 [11501076.350488] hrtimer_interrupt+0x100/0x220 [11501076.350490] __sysvec_apic_timer_interrupt+0x5d/0xf0 [11501076.350492] asm_call_irq_on_stack+0x12/0x20 [11501076.350493] [11501076.350495] sysvec_apic_timer_interrupt+0x73/0x80 [11501076.350496] asm_sysvec_apic_timer_interrupt+0x12/0x20 [11501076.350498] RIP: 0010:console_unlock+0x369/0x4d0 [11501076.350500] Code: 85 ed fc ff ff e9 4a ff ff ff 89 ea 48 c7 c6 80 a8 a1 b1 4c 89 f7 e8 f6 c0 92 00 e9 8c fe ff ff e8 dc 23 00 00 4c 89 ff 57 9d <0f> 1f 44 00 00 8b 04 24 85 c0 0f 84 fc fc ff ff e8 32 b8 71 00 e9 [11501076.350500] RSP: 0018:ffffad7905b67a30 EFLAGS: 00000247 [11501076.350502] RAX: 0000000000000001 RBX: ffffffffb153bf20 RCX: 0000000000000000 [11501076.350502] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000247 [11501076.350503] RBP: 000000000000005f R08: 0720072007200720 R09: 0720072007200720 [11501076.350503] R10: 0720072007200720 R11: 0720072007200720 R12: ffffffffb1a1b490 [11501076.350504] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000247 [11501076.350506] vprintk_emit+0x184/0x290 [11501076.350507] printk+0x58/0x6f [11501076.350510] dump_task+0x114/0x130 [11501076.350512] dump_header+0x160/0x1d8 [11501076.350513] oom_kill_process.cold.36+0xb/0x10 [11501076.350514] out_of_memory+0x1a8/0x4d0 [11501076.350516] __alloc_pages_slowpath.constprop.111+0xbeb/0xcd0 [11501076.350518] __alloc_pages_nodemask+0x2de/0x310 [11501076.350520] alloc_pages_vma+0x74/0x1e0 [11501076.350522] wp_page_copy+0x47d/0x7a0 [11501076.350524] handle_mm_fault+0x5ff/0x1660 [11501076.350526] exc_page_fault+0x290/0x550 [11501076.350527] ? asm_exc_page_fault+0x8/0x30 [11501076.350528] asm_exc_page_fault+0x1e/0x30 [11501076.350529] RIP: 0033:0x26fb438 [11501076.350534] Code: Unable to access opcode bytes at RIP 0x26fb40e. [11501076.350535] RSP: 002b:00007f77c6ffd230 EFLAGS: 00010246 [11501076.350536] RAX: 00002185f0acb000 RBX: 0000000003ffe010 RCX: 0000000000000000 [11501076.350536] RDX: 000000000dc7cbff RSI: 00002185f0acb000 RDI: 00007f7cabdda700 [11501076.350536] RBP: 000000c00116b190 R08: 00000000017e8810 R09: 00000000000000cb [11501076.350537] R10: 000000000dc7cb00 R11: 00007f7ac4f51e38 R12: 000000c00116b158 [11501076.350537] R13: 000000c01f586000 R14: 000000c000df2000 R15: 000000c00116c000 [11501076.668628] [ 707250] 0 707250 396868 9679 413696 0 0 image [11501076.677280] [ 707270] 0 707270 435846 9512 442368 0 0 exe [11501076.685749] [ 707272] 0 707272 1380297 96934 2056192 0 0 exe [11501076.694212] [ 707303] 0 707303 4157 22 28672 0 0 exe [11501076.702683] [ 707325] 0 707325 1 0 12288 0 0 exe [11501076.711152] [ 707346] 0 707346 28785 3128 237568 0 0 exe [11501076.719623] [ 707568] 0 707568 4145 20 28672 0 0 exe [11501076.728095] [ 707569] 0 707569 4145 20 28672 0 0 exe [11501076.736558] [ 707570] 0 707570 4151 21 28672 0 0 exe [11501076.745027] [ 707582] 0 707582 4151 21 28672 0 0 exe [11501076.753595] [ 707589] 0 707589 4151 21 28672 0 0 exe [11501076.762064] [ 707590] 0 707590 4151 21 28672 0 0 exe [11501076.770534] [ 707605] 0 707605 4151 21 28672 0 0 exe [11501076.779000] [ 707622] 0 707622 4151 19 28672 0 0 exe [11501076.787476] [ 707623] 0 707623 4151 19 28672 0 0 exe [11501076.795949] [ 707625] 0 707625 4151 21 28672 0 0 exe [11501076.804413] [ 707626] 0 707626 4151 21 28672 0 0 exe [11501076.812891] [ 707629] 0 707629 4145 20 28672 0 0 exe [11501076.821363] [ 707639] 0 707639 4145 20 28672 0 0 exe [11501076.829825] [ 707642] 0 707642 4157 22 28672 0 0 exe [11501076.838296] [ 707645] 0 707645 4163 23 28672 0 0 exe [11501076.846756] [ 707647] 0 707647 4157 22 28672 0 0 exe [11501076.855229] [ 707673] 0 707673 104233 69238 839680 0 0 exe [11501076.863696] [ 707674] 0 707674 104233 69238 839680 0 0 exe [11501076.872171] [ 707737] 0 707737 4151 21 36864 0 0 exe [11501076.880728] [ 707767] 0 707767 4139 18 36864 0 0 exe [11501076.889203] [ 707865] 0 707865 104233 69238 839680 0 0 exe [11501076.897678] [ 707880] 0 707880 4163 23 28672 0 0 exe [11501076.906152] [ 707892] 0 707892 4145 20 28672 0 0 exe [11501076.914626] [ 707894] 0 707894 4151 21 28672 0 0 exe [11501076.923091] [ 707895] 0 707895 4151 21 28672 0 0 exe [11501076.931553] [ 707918] 0 707918 4151 21 36864 0 0 exe [11501076.940018] [ 707932] 0 707932 4151 21 28672 0 0 exe [11501076.948489] [ 707945] 0 707945 104233 69238 839680 0 0 exe [11501076.956950] [ 707946] 0 707946 4169 24 28672 0 0 exe [11501076.965435] [ 708048] 0 708048 103587 69076 823296 0 0 exe [11501076.973908] [ 708050] 0 708050 378371 9362 405504 0 0 image [11501076.982563] [ 708062] 0 708062 396517 8802 405504 0 0 image [11501076.991315] [ 708073] 0 708073 454343 9223 462848 0 0 exe [11501076.999779] [ 708074] 0 708074 892728 23414 802816 0 0 exe [11501077.008256] [ 708087] 0 708087 21927 8234 204800 0 0 exe [11501077.016718] [ 708127] 0 708127 886 1 53248 0 0 exe [11501077.025191] [ 708153] 0 708153 914 1 65536 0 0 exe [11501077.033670] [ 708157] 0 708157 1 1 12288 0 0 exe [11501077.042136] [ 708163] 0 708163 4151 21 28672 0 0 exe [11501077.050601] [ 708172] 0 708172 28483 2806 233472 0 0 exe [11501077.059067] [ 708195] 0 708195 165 1 36864 0 0 exe [11501077.067543] [ 708316] 0 708316 395081 7855 389120 0 0 image [11501077.076185] [ 708322] 0 708322 358183 6893 372736 0 0 image [11501077.084822] [ 708344] 0 708344 415658 7492 421888 0 0 exe [11501077.093295] [ 708346] 0 708346 452492 8686 430080 0 0 exe [11501077.101762] [ 708347] 0 708347 1773053 207081 3670016 0 0 exe [11501077.110242] [ 708350] 0 708350 3679765 380667 14757888 0 0 exe [11501077.118713] [ 708402] 0 708402 1 1 12288 0 0 exe [11501077.127180] [ 708403] 0 708403 1 1 12288 0 0 exe [11501077.135644] [ 708430] 0 708430 28329 2852 237568 0 0 exe [11501077.144115] [ 708434] 0 708434 28208 3241 237568 0 0 exe [11501077.152585] [ 708477] 0 708477 4157 22 28672 0 0 exe [11501077.161049] [ 708479] 0 708479 4157 22 28672 0 0 exe [11501077.169537] [ 708494] 0 708494 357607 5946 356352 0 0 image [11501077.178188] [ 708497] 0 708497 339174 5911 344064 0 0 image [11501077.186828] [ 708521] 0 708521 40122 11821 315392 0 0 exe [11501077.195389] [ 708525] 0 708525 123232 88652 905216 0 0 exe [11501077.203860] [ 708571] 0 708571 620 1 49152 0 0 exe [11501077.212326] [ 708582] 0 708582 507 1 49152 0 0 exe [11501077.220792] [ 708640] 0 708640 578 114 49152 0 0 exe [11501077.229266] [ 708648] 0 708648 570 1 61440 0 0 exe [11501077.237729] [ 708654] 0 708654 606 1 57344 0 0 exe [11501077.246192] [ 708656] 0 708656 722 1 45056 0 0 exe [11501077.254656] [ 708667] 0 708667 785 1 57344 0 0 exe [11501077.263135] [ 708679] 0 708679 400 1 53248 0 0 exe [11501077.271603] [ 708696] 0 708696 457 1 65536 0 0 exe [11501077.280069] [ 708704] 0 708704 4157 22 36864 0 0 exe [11501077.288549] [ 708754] 0 708754 1 1 12288 0 0 exe [11501077.297017] [ 708755] 0 708755 1 1 12288 0 0 exe [11501077.305496] [ 708765] 0 708765 1 1 12288 0 0 exe [11501077.313994] [ 708816] 0 708816 1 1 12288 0 0 exe [11501077.322459] [ 709163] 0 709163 4157 22 36864 0 0 exe [11501077.330923] [ 709215] 0 709215 4151 21 28672 0 0 exe [11501077.339385] [ 709233] 0 709233 403 129 53248 0 0 exe [11501077.347869] [ 709237] 0 709237 683 1 61440 0 0 exe [11501077.356334] [ 709242] 0 709242 4151 21 28672 0 0 exe [11501077.364799] [ 709241] 0 709241 455 1 65536 0 0 exe [11501077.373276] [ 709244] 0 709244 551 1 53248 0 0 exe [11501077.381742] [ 709255] 0 709255 614 1 65536 0 0 exe [11501077.390219] [ 709264] 0 709264 418 1 53248 0 0 exe [11501077.398713] [ 709276] 0 709276 422 1 65536 0 0 exe [11501077.407236] [ 709296] 0 709296 1 1 12288 0 0 exe [11501077.415731] [ 709307] 0 709307 2260 1 77824 0 0 exe [11501077.424214] [ 709318] 0 709318 210 1 40960 0 0 exe [11501077.432685] [ 709322] 0 709322 1 1 12288 0 0 exe [11501077.441163] [ 709602] 0 709602 1 1 12288 0 0 exe [11501077.449638] [ 709612] 0 709612 1 1 12288 0 0 exe [11501077.458115] [ 709762] 0 709762 1 1 12288 0 0 exe [11501077.466588] [ 709787] 0 709787 1 1 12288 0 0 exe [11501077.475062] [ 709954] 0 709954 4151 21 36864 0 0 exe [11501077.483567] [ 709955] 0 709955 4151 21 36864 0 0 exe [11501077.492063] [ 709965] 0 709965 4151 21 36864 0 0 exe [11501077.500534] [ 710095] 0 710095 4157 22 28672 0 0 exe [11501077.509024] [ 710098] 0 710098 4485 21 69632 0 0 exe [11501077.517502] [ 710106] 0 710106 7905 22 98304 0 0 exe [11501077.525976] [ 710107] 0 710107 7905 22 98304 0 0 exe [11501077.534456] [ 710108] 0 710108 7905 22 98304 0 0 exe [11501077.542942] [ 710118] 0 710118 7905 22 98304 0 0 exe [11501077.551414] [ 710124] 0 710124 4163 23 28672 0 0 exe [11501077.559888] [ 710211] 0 710211 4151 21 36864 0 0 exe [11501077.569058] [ 710214] 0 710214 4151 21 36864 0 0 exe [11501077.577557] [ 710215] 0 710215 4151 21 36864 0 0 exe [11501077.586030] [ 710282] 0 710282 4151 21 28672 0 0 exe [11501077.594506] [ 710439] 0 710439 4157 22 28672 0 0 exe [11501077.602999] [ 710529] 0 710529 4151 21 36864 0 0 exe [11501077.611487] [ 710537] 0 710537 4151 21 36864 0 0 exe [11501077.620074] [ 710680] 0 710680 4133 16 28672 0 0 exe [11501077.628566] [ 710681] 0 710681 4133 16 28672 0 0 exe [11501077.637050] [ 710682] 0 710682 4133 16 28672 0 0 exe [11501077.645531] [ 710683] 0 710683 4133 16 28672 0 0 exe [11501077.654005] [ 710684] 0 710684 14637 9744 167936 0 0 exe [11501077.662481] [ 710685] 0 710685 14637 9744 167936 0 0 exe [11501077.670979] [ 710686] 0 710686 4133 16 28672 0 0 exe [11501077.679484] [ 710687] 0 710687 4133 16 28672 0 0 exe [11501077.687979] [ 710688] 0 710688 4133 16 28672 0 0 exe [11501077.696461] [ 710689] 0 710689 4133 16 28672 0 0 exe [11501077.704949] [ 710690] 0 710690 4139 19 28672 0 0 exe [11501077.713432] [ 710691] 0 710691 4139 19 28672 0 0 exe [11501077.721910] [ 710693] 0 710693 4133 16 28672 0 0 exe [11501077.730391] [ 710694] 0 710694 4133 16 28672 0 0 exe [11501077.738976] [ 710701] 0 710701 4133 16 28672 0 0 exe [11501077.747472] [ 710702] 0 710702 4133 16 28672 0 0 exe [11501077.755953] [ 710703] 0 710703 4133 16 28672 0 0 exe [11501077.764419] [ 710704] 0 710704 4133 16 28672 0 0 exe [11501077.772881] [ 710710] 0 710710 14637 9744 167936 0 0 exe [11501077.781361] [ 710716] 0 710716 4151 21 28672 0 0 exe [11501077.789831] [ 710719] 0 710719 4151 21 28672 0 0 exe [11501077.798295] [ 710722] 0 710722 4139 19 28672 0 0 exe [11501077.806759] [ 710723] 0 710723 4151 21 28672 0 0 exe [11501077.815220] [ 710725] 0 710725 4151 21 28672 0 0 exe [11501077.823678] [ 710727] 0 710727 4151 21 28672 0 0 exe [11501077.832144] [ 710728] 0 710728 4151 21 28672 0 0 exe [11501077.840607] [ 710729] 0 710729 4151 21 28672 0 0 exe [11501077.849085] [ 710745] 0 710745 14637 9744 167936 0 0 exe [11501077.857553] [ 710750] 0 710750 6981 22 98304 0 0 exe [11501077.866036] [ 710751] 0 710751 6981 22 98304 0 0 exe [11501077.874585] [ 710752] 0 710752 6981 22 98304 0 0 exe [11501077.883138] [ 710761] 0 710761 4157 22 36864 0 0 exe [11501077.891604] [ 710767] 0 710767 1 1 12288 0 0 exe [11501077.900084] [ 710849] 0 710849 1 1 12288 0 0 exe [11501077.908637] [ 710856] 0 710856 1 1 12288 0 0 exe [11501077.917110] [ 710946] 0 710946 6981 22 98304 0 0 exe [11501077.925580] [ 710997] 0 710997 4151 21 36864 0 0 exe [11501077.934065] [ 710999] 0 710999 1 1 12288 0 0 exe [11501077.942538] [ 711023] 0 711023 4157 22 28672 0 0 exe [11501077.951010] [ 711077] 0 711077 1 1 12288 0 0 exe [11501077.959471] [ 711147] 0 711147 4151 21 28672 0 0 exe [11501077.968033] [ 711197] 0 711197 36822 20338 352256 0 0 exe [11501077.976535] [ 711198] 0 711198 36822 20338 352256 0 0 exe [11501077.985004] [ 711257] 0 711257 1 1 12288 0 0 exe [11501077.993479] [ 711295] 0 711295 1 1 12288 0 0 exe [11501078.001940] [ 711299] 0 711299 1 1 12288 0 0 exe [11501078.010413] [ 711468] 0 711468 4145 19 36864 0 0 exe [11501078.018974] [ 711470] 0 711470 4151 21 36864 0 0 exe [11501078.027438] [ 711471] 0 711471 4151 21 36864 0 0 exe [11501078.035905] [ 711473] 0 711473 4151 21 36864 0 0 exe [11501078.044376] [ 711688] 0 711688 4539 20 81920 0 0 exe [11501078.052849] [ 711708] 0 711708 4133 16 36864 0 0 exe [11501078.061405] [ 711709] 0 711709 4133 16 36864 0 0 exe [11501078.069878] [ 711710] 0 711710 4133 16 36864 0 0 exe [11501078.080285] [ 711711] 0 711711 4133 16 36864 0 0 exe [11501078.088750] [ 711712] 0 711712 4133 16 36864 0 0 exe [11501078.097402] [ 711713] 0 711713 4133 16 36864 0 0 exe [11501078.106045] [ 711714] 0 711714 4133 16 36864 0 0 exe [11501078.114517] [ 711715] 0 711715 4133 16 36864 0 0 exe [11501078.122985] [ 711716] 0 711716 4133 16 36864 0 0 exe [11501078.131445] [ 711717] 0 711717 4133 16 36864 0 0 exe [11501078.139919] [ 711718] 0 711718 4139 18 36864 0 0 exe [11501078.148381] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=ci-gvisor-ptrace-2-race-0,mems_allowed=0-1,global_oom,task_memcg=/docker/565b2f6324c19684ac99270c00af3806c11bcfb36671d1672e739869b03c459b/ci-gvisor-ptrace-2-race-0,task=exe,pid=596070,uid=0 [11501078.172528] Out of memory: Killed process 596070 (exe) total-vm:230162228kB, anon-rss:60273056kB, file-rss:0kB, shmem-rss:106204kB, UID:0 pgtables:195412kB oom_score_adj:0 [11501080.296157] oom_reaper: reaped process 596070 (exe), now anon-rss:0kB, file-rss:0kB, shmem-rss:106436kB [11501754.366140] exe[658529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501754.484555] exe[660406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501754.484870] exe[661164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a958aee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501755.194372] exe[692806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11503371.018999] exe[758686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97aded2568 ax:8 si:1 di:7f97aded2660 [11503371.923508] exe[737086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97ade6f568 ax:8 si:1 di:7f97ade6f660 [11503372.768376] exe[736664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97ade6f568 ax:8 si:1 di:7f97ade6f660 [11504288.268234] exe[777225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504288.352122] exe[777223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504288.441650] exe[757296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504621.904716] exe[796211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11504621.981614] exe[789723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11504622.759237] exe[789731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11505491.464933] exe[789883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11fe858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505491.548172] exe[790005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11fe858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505491.715580] exe[811352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11dd858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505659.151999] exe[815668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505659.318085] exe[815803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505660.228695] exe[821101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505660.235992] exe[821890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11510253.600538] exe[911074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b5c858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510253.709137] exe[902857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b3b858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510254.348250] exe[906187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b3b858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510872.370401] exe[926145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300575ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510872.771766] exe[927833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300554ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510872.943204] exe[926192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300575ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510999.751958] exe[907967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11510999.924400] exe[911510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11511000.076264] exe[911511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11511000.111989] exe[906693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bafee8 ax:0 si:20000040 di:ffffffffff600000 [11512793.987365] exe[921191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.087920] exe[939206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.151767] exe[977517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.176921] exe[939173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b5a858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512860.478683] exe[969874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512860.552871] exe[971457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512860.552998] exe[969984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed15ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512861.309913] exe[974643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11514238.765640] exe[7460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514239.374632] exe[8458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514239.858057] exe[7505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514512.814000] exe[24936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55749d87e40a cs:33 sp:7f96337ceee8 ax:12 si:ffffffffff600000 di:55749d8eaff2 [11514512.907921] exe[14037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55749d87e40a cs:33 sp:7f96337adee8 ax:12 si:ffffffffff600000 di:55749d8eaff2 [11519731.203430] exe[126925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6b4ee8 ax:0 si:20000040 di:ffffffffff600000 [11519731.310875] exe[114263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6d5ee8 ax:0 si:20000040 di:ffffffffff600000 [11519731.434356] exe[121514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6d5ee8 ax:0 si:20000040 di:ffffffffff600000 [11521050.468050] exe[151789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625ad3ea839 cs:33 sp:7ee0cbc79858 ax:0 si:5625ad443070 di:ffffffffff600000 [11521050.816659] exe[133675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab731d839 cs:33 sp:7fed37c89858 ax:0 si:563ab7376070 di:ffffffffff600000 [11521052.876932] exe[141940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b57d7c6839 cs:33 sp:7f2517e8c858 ax:0 si:55b57d81f070 di:ffffffffff600000 [11521121.894560] exe[100247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce8262c839 cs:33 sp:7f1da29be858 ax:0 si:55ce82685070 di:ffffffffff600000 [11521206.393726] exe[151927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9551b3839 cs:33 sp:7f6d018cf858 ax:0 si:55a95520c070 di:ffffffffff600000 [11521270.937146] exe[10392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602a7eaa839 cs:33 sp:7f1eda4ec858 ax:0 si:5602a7f03070 di:ffffffffff600000 [11521312.507336] exe[94102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559003f50839 cs:33 sp:7ecb85515858 ax:0 si:559003fa9070 di:ffffffffff600000 [11521338.796759] exe[135964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652b64f6839 cs:33 sp:7f039f6b2858 ax:0 si:5652b654f070 di:ffffffffff600000 [11521380.843392] exe[153631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597f964f839 cs:33 sp:7f1b8c470858 ax:0 si:5597f96a8070 di:ffffffffff600000 [11521402.164539] exe[123385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564167cd3839 cs:33 sp:7f53bfc2d858 ax:0 si:564167d2c070 di:ffffffffff600000 [11521536.814608] exe[137784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbf1a99839 cs:33 sp:7f2687496858 ax:0 si:55fbf1af2070 di:ffffffffff600000 [11521559.707748] exe[24637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac56ec7839 cs:33 sp:7fa4065d9858 ax:0 si:55ac56f20070 di:ffffffffff600000 [11521590.176758] exe[158447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb7147b839 cs:33 sp:7ec6cb761858 ax:0 si:55bb714d4070 di:ffffffffff600000 [11521594.000222] exe[161804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f46f158839 cs:33 sp:7efa4c19b858 ax:0 si:55f46f1b1070 di:ffffffffff600000 [11521881.436012] exe[129233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd3112e839 cs:33 sp:7f28838b1858 ax:0 si:55cd31187070 di:ffffffffff600000 [11524364.008585] exe[152947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41e0ee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524364.122496] exe[197700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41bfee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524364.207832] exe[153660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41e0ee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524365.144861] exe[153371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.224043] exe[152947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.310128] exe[227186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.397432] exe[197824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.453863] exe[153103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.545041] exe[197814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.661035] exe[156974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524920.849310] warn_bad_vsyscall: 19 callbacks suppressed [11524920.849313] exe[203744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11524920.918033] exe[203744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11524920.978520] exe[170729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11525389.297293] exe[263491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611ec858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525389.468776] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611cb858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.090532] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.118945] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.145809] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.173946] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.202267] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.229742] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.259408] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.293727] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525474.213328] warn_bad_vsyscall: 25 callbacks suppressed [11525474.213332] exe[239910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573c08b3839 cs:33 sp:7fd11bd8f858 ax:0 si:5573c090c070 di:ffffffffff600000 [11525726.382681] exe[230121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457dd858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11525726.530717] exe[227463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457bc858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11525726.669907] exe[224897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457bc858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11527490.905451] exe[307905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.013246] exe[279055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.323215] exe[279641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eceee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.323359] exe[281180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11528321.013618] exe[319222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528321.105322] exe[306490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528321.195354] exe[300252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528335.989506] exe[243987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176eea858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.019150] exe[313012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176f2c858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.259617] exe[313021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176f0b858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.290134] exe[313019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176e24858 ax:0 si:5587dff80062 di:ffffffffff600000 [11530649.105531] exe[352415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530649.266359] exe[342771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530649.374392] exe[347653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530650.194492] exe[348004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.279713] exe[342938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.354752] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.419998] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.485322] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.555924] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.631477] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.124495] warn_bad_vsyscall: 319 callbacks suppressed [11530654.124499] exe[346814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.173782] exe[342708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.217687] exe[350761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.256534] exe[346763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.301738] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.358451] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.421216] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.468018] exe[346814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.513829] exe[350761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.559543] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.371355] warn_bad_vsyscall: 277 callbacks suppressed [11530659.371358] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.693220] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.085260] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.158793] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.193093] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f7e858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000