0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:56.417385 754382 task_exit.go:204] [ 600: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.417483 754382 task_signals.go:204] [ 600: 601] Signal 600, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.417516 754382 task_signals.go:204] [ 600: 603] Signal 600, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.417525 754382 task_exit.go:204] [ 600: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.417547 754382 task_signals.go:204] [ 600: 604] Signal 600, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.417596 754382 task_exit.go:204] [ 600: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.417578 754382 task_signals.go:204] [ 600: 602] Signal 600, PID: 602, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.417604 754382 task_exit.go:204] [ 600: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.417633 754382 task_exit.go:204] [ 600: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.417663 754382 task_exit.go:204] [ 600: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.417681 754382 task_exit.go:204] [ 600: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.417704 754382 task_exit.go:204] [ 600: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.417717 754382 task_exit.go:204] [ 600: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.417779 754382 task_exit.go:204] [ 600: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.417789 754382 task_exit.go:204] [ 600: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.417810 754382 task_exit.go:204] [ 600: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.419470 754382 task_exit.go:204] [ 600: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.419510 754382 task_exit.go:204] [ 600: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.419530 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.419574 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.419591 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.419782 754382 task_exit.go:204] [ 600: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.420643 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.422590 754382 syscalls.go:262] [ 605: 605] Allocating stack with size of 8388608 bytes D0712 23:58:56.422917 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.424282 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.424333 754382 usertrap_amd64.go:106] [ 605: 605] Map a usertrap vma at 60000 D0712 23:58:56.424436 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 1 D0712 23:58:56.424475 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:56.424880 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.424914 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 2 D0712 23:58:56.424927 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:56.429650 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.429686 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 3 D0712 23:58:56.429697 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:56.436670 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.436713 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 4 D0712 23:58:56.436727 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:56.438135 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.438178 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 5 D0712 23:58:56.438194 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:56.438261 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.438282 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 6 D0712 23:58:56.438298 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:56.438757 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.438779 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 7 D0712 23:58:56.438790 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:56.439017 754382 usertrap_amd64.go:212] [ 605: 606] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.439045 754382 usertrap_amd64.go:122] [ 605: 606] Allocate a new trap: 0xc0008b36b0 8 D0712 23:58:56.439058 754382 usertrap_amd64.go:225] [ 605: 606] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:56.439267 754382 usertrap_amd64.go:212] [ 605: 606] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.439284 754382 usertrap_amd64.go:122] [ 605: 606] Allocate a new trap: 0xc0008b36b0 9 D0712 23:58:56.439296 754382 usertrap_amd64.go:225] [ 605: 606] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:56.439363 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.439380 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 10 D0712 23:58:56.439390 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:56.447787 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.447832 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 11 D0712 23:58:56.447846 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:56.450490 754382 usertrap_amd64.go:212] [ 605: 606] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.450529 754382 usertrap_amd64.go:122] [ 605: 606] Allocate a new trap: 0xc0008b36b0 12 D0712 23:58:56.450551 754382 usertrap_amd64.go:225] [ 605: 606] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:56.450642 754382 usertrap_amd64.go:212] [ 605: 606] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.450669 754382 usertrap_amd64.go:122] [ 605: 606] Allocate a new trap: 0xc0008b36b0 13 D0712 23:58:56.450682 754382 usertrap_amd64.go:225] [ 605: 606] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:56.450731 754382 task_signals.go:470] [ 605: 605] Notified of signal 23 D0712 23:58:56.450794 754382 task_signals.go:220] [ 605: 605] Signal 23: delivering to handler D0712 23:58:56.459688 754382 usertrap_amd64.go:212] [ 605: 605] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.459731 754382 usertrap_amd64.go:122] [ 605: 605] Allocate a new trap: 0xc0008b36b0 14 D0712 23:58:56.459747 754382 usertrap_amd64.go:225] [ 605: 605] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:56.459835 754382 task_exit.go:204] [ 605: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.459875 754382 task_exit.go:204] [ 605: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.459897 754382 task_signals.go:204] [ 605: 608] Signal 605, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.459951 754382 task_exit.go:204] [ 605: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.459950 754382 task_signals.go:204] [ 605: 607] Signal 605, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.459972 754382 task_exit.go:204] [ 605: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.459917 754382 task_signals.go:204] [ 605: 609] Signal 605, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.459992 754382 task_exit.go:204] [ 605: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.459918 754382 task_signals.go:204] [ 605: 606] Signal 605, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.460012 754382 task_exit.go:204] [ 605: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.460039 754382 task_exit.go:204] [ 605: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.460049 754382 task_exit.go:204] [ 605: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.460080 754382 task_exit.go:204] [ 605: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.460103 754382 task_exit.go:204] [ 605: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.460111 754382 task_exit.go:204] [ 605: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.460123 754382 task_exit.go:204] [ 605: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.461878 754382 task_exit.go:204] [ 605: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.461911 754382 task_exit.go:204] [ 605: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.461935 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.462040 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.462071 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.462228 754382 task_exit.go:204] [ 605: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.464099 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.465994 754382 syscalls.go:262] [ 610: 610] Allocating stack with size of 8388608 bytes D0712 23:58:56.466155 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.467750 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.467805 754382 usertrap_amd64.go:106] [ 610: 610] Map a usertrap vma at 61000 D0712 23:58:56.467933 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 1 D0712 23:58:56.467965 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:56.468486 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.468514 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 2 D0712 23:58:56.468521 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:56.469330 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.469396 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 3 D0712 23:58:56.469418 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:56.476708 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.476756 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 4 D0712 23:58:56.476774 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:56.478012 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.478049 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 5 D0712 23:58:56.478063 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:56.478111 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.478126 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 6 D0712 23:58:56.478157 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:56.478678 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.478761 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 7 D0712 23:58:56.478791 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:56.479004 754382 usertrap_amd64.go:212] [ 610: 611] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.479034 754382 usertrap_amd64.go:122] [ 610: 611] Allocate a new trap: 0xc00093d5f0 8 D0712 23:58:56.479046 754382 usertrap_amd64.go:225] [ 610: 611] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:56.479233 754382 usertrap_amd64.go:212] [ 610: 611] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.479258 754382 usertrap_amd64.go:122] [ 610: 611] Allocate a new trap: 0xc00093d5f0 9 D0712 23:58:56.479270 754382 usertrap_amd64.go:225] [ 610: 611] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:56.479329 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.479339 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 10 D0712 23:58:56.479349 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:56.487718 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.487754 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 11 D0712 23:58:56.487765 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:56.490643 754382 usertrap_amd64.go:212] [ 610: 611] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.490680 754382 usertrap_amd64.go:122] [ 610: 611] Allocate a new trap: 0xc00093d5f0 12 D0712 23:58:56.490694 754382 usertrap_amd64.go:225] [ 610: 611] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:56.490752 754382 usertrap_amd64.go:212] [ 610: 611] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.490772 754382 usertrap_amd64.go:122] [ 610: 611] Allocate a new trap: 0xc00093d5f0 13 D0712 23:58:56.490781 754382 usertrap_amd64.go:225] [ 610: 611] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:56.490821 754382 task_signals.go:470] [ 610: 610] Notified of signal 23 D0712 23:58:56.490907 754382 task_signals.go:220] [ 610: 610] Signal 23: delivering to handler I0712 23:58:56.498533 754382 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0712 23:58:56.498623 754382 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.498636 754382 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc00093d5f0 14 D0712 23:58:56.498646 754382 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:56.498678 754382 task_exit.go:204] [ 610: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.498699 754382 task_exit.go:204] [ 610: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.498723 754382 task_signals.go:204] [ 610: 613] Signal 610, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.498746 754382 task_signals.go:204] [ 610: 614] Signal 610, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.498765 754382 task_signals.go:204] [ 610: 611] Signal 610, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.498771 754382 task_exit.go:204] [ 610: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.498782 754382 task_exit.go:204] [ 610: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.498793 754382 task_exit.go:204] [ 610: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.498800 754382 task_exit.go:204] [ 610: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.498814 754382 task_exit.go:204] [ 610: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.498762 754382 task_signals.go:204] [ 610: 612] Signal 610, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.498821 754382 task_exit.go:204] [ 610: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.498895 754382 task_exit.go:204] [ 610: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.498934 754382 task_exit.go:204] [ 610: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.498955 754382 task_exit.go:204] [ 610: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.498973 754382 task_exit.go:204] [ 610: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.500535 754382 task_exit.go:204] [ 610: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.500593 754382 task_exit.go:204] [ 610: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.500609 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.500678 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.500705 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.500788 754382 task_exit.go:204] [ 610: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.501580 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.502887 754382 syscalls.go:262] [ 615: 615] Allocating stack with size of 8388608 bytes D0712 23:58:56.503104 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.504482 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.504585 754382 usertrap_amd64.go:106] [ 615: 615] Map a usertrap vma at 61000 D0712 23:58:56.504686 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 1 D0712 23:58:56.504714 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:56.505220 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.505245 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 2 D0712 23:58:56.505255 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:56.505795 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.505817 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 3 D0712 23:58:56.505826 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:56.512478 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.512517 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 4 D0712 23:58:56.512530 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:56.513747 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.513769 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 5 D0712 23:58:56.513777 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:56.513844 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.513863 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 6 D0712 23:58:56.513872 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:56.514175 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.514203 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 7 D0712 23:58:56.514212 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:56.514378 754382 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.514394 754382 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b3ad0 8 D0712 23:58:56.514402 754382 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:56.514621 754382 usertrap_amd64.go:212] [ 615: 617] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:56.514692 754382 usertrap_amd64.go:122] [ 615: 617] Allocate a new trap: 0xc0008b3ad0 9 D0712 23:58:56.514715 754382 usertrap_amd64.go:225] [ 615: 617] Apply the binary patch addr 46b6e0 trap addr 612d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:56.514762 754382 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.514781 754382 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b3ad0 10 D0712 23:58:56.514789 754382 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:56.514801 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.514807 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 11 D0712 23:58:56.514821 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:56.523304 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.523355 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 12 D0712 23:58:56.523371 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:56.526232 754382 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.526278 754382 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b3ad0 13 D0712 23:58:56.526294 754382 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:56.526692 754382 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.526725 754382 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b3ad0 14 D0712 23:58:56.526740 754382 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:56.527895 754382 task_signals.go:470] [ 615: 615] Notified of signal 23 D0712 23:58:56.527947 754382 task_signals.go:220] [ 615: 615] Signal 23: delivering to handler I0712 23:58:56.535307 754382 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0712 23:58:56.535442 754382 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.535473 754382 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b3ad0 15 D0712 23:58:56.535489 754382 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:58:56.535627 754382 task_exit.go:204] [ 615: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.535686 754382 task_signals.go:204] [ 615: 620] Signal 615, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.535732 754382 task_signals.go:204] [ 615: 617] Signal 615, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.535757 754382 task_signals.go:204] [ 615: 616] Signal 615, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.535772 754382 task_exit.go:204] [ 615: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.535798 754382 task_signals.go:204] [ 615: 618] Signal 615, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.535810 754382 task_exit.go:204] [ 615: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.535820 754382 task_exit.go:204] [ 615: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.535838 754382 task_exit.go:204] [ 615: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.535807 754382 task_signals.go:204] [ 615: 619] Signal 615, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.535857 754382 task_exit.go:204] [ 615: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.535867 754382 task_exit.go:204] [ 615: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.535883 754382 task_exit.go:204] [ 615: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.535896 754382 task_exit.go:204] [ 615: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.535906 754382 task_exit.go:204] [ 615: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.535921 754382 task_exit.go:204] [ 615: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.535932 754382 task_exit.go:204] [ 615: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.535942 754382 task_exit.go:204] [ 615: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.535948 754382 task_exit.go:204] [ 615: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.535961 754382 task_exit.go:204] [ 615: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.537630 754382 task_exit.go:204] [ 615: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.537661 754382 task_exit.go:204] [ 615: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.537679 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.537719 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.537732 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.538012 754382 task_exit.go:204] [ 615: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.539047 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.540751 754382 syscalls.go:262] [ 621: 621] Allocating stack with size of 8388608 bytes D0712 23:58:56.541002 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.542311 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.542367 754382 usertrap_amd64.go:106] [ 621: 621] Map a usertrap vma at 61000 D0712 23:58:56.542508 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 1 D0712 23:58:56.542575 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:56.543064 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.543089 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 2 D0712 23:58:56.543107 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:56.544077 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.544112 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 3 D0712 23:58:56.544125 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:56.551839 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.551898 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 4 D0712 23:58:56.551917 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:56.553390 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.553457 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 5 D0712 23:58:56.553482 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:56.553549 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.553559 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 6 D0712 23:58:56.553569 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:56.554117 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.554148 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 7 D0712 23:58:56.554163 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:56.554431 754382 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.554476 754382 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0019e81b0 8 D0712 23:58:56.554492 754382 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:56.554924 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.554981 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 9 D0712 23:58:56.554998 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:56.555129 754382 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.555168 754382 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0019e81b0 10 D0712 23:58:56.555180 754382 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:56.555997 754382 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.556037 754382 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0019e81b0 11 D0712 23:58:56.556052 754382 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:56.556242 754382 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.556271 754382 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0019e81b0 12 D0712 23:58:56.556282 754382 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:56.556341 754382 task_signals.go:470] [ 621: 621] Notified of signal 23 D0712 23:58:56.556562 754382 task_signals.go:220] [ 621: 621] Signal 23: delivering to handler D0712 23:58:56.563663 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.563687 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 13 D0712 23:58:56.563696 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:56.567058 754382 task_signals.go:470] [ 621: 621] Notified of signal 23 D0712 23:58:56.567127 754382 task_signals.go:220] [ 621: 621] Signal 23: delivering to handler I0712 23:58:56.575205 754382 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0712 23:58:56.575282 754382 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.575295 754382 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0019e81b0 14 D0712 23:58:56.575306 754382 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:56.575325 754382 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.575360 754382 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.575382 754382 task_signals.go:204] [ 621: 624] Signal 621, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.575392 754382 task_exit.go:204] [ 621: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.575384 754382 task_signals.go:204] [ 621: 623] Signal 621, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.575398 754382 task_exit.go:204] [ 621: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.575412 754382 task_exit.go:204] [ 621: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.575433 754382 task_signals.go:204] [ 621: 625] Signal 621, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.575461 754382 task_exit.go:204] [ 621: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.575472 754382 task_signals.go:204] [ 621: 622] Signal 621, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.575485 754382 task_exit.go:204] [ 621: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.575524 754382 task_exit.go:204] [ 621: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.575533 754382 task_exit.go:204] [ 621: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.575548 754382 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.575619 754382 task_exit.go:204] [ 621: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.575646 754382 task_exit.go:204] [ 621: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.577046 754382 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.577075 754382 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.577087 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.577388 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.577420 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.577589 754382 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.578565 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.580126 754382 syscalls.go:262] [ 626: 626] Allocating stack with size of 8388608 bytes D0712 23:58:56.580814 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.584431 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.585152 754382 usertrap_amd64.go:106] [ 626: 626] Map a usertrap vma at 62000 D0712 23:58:56.585297 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 1 D0712 23:58:56.585335 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:56.585778 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.585810 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 2 D0712 23:58:56.585823 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:56.586660 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.586736 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 3 D0712 23:58:56.586755 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:56.594503 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.594560 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 4 D0712 23:58:56.594577 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:56.596268 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.596335 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 5 D0712 23:58:56.596356 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:56.596431 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.596448 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 6 D0712 23:58:56.596457 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:56.596990 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.597028 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 7 D0712 23:58:56.597039 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:56.597331 754382 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.597400 754382 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000a80ab0 8 D0712 23:58:56.597428 754382 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:56.597724 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.597762 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 9 D0712 23:58:56.597779 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:56.597799 754382 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.597808 754382 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000a80ab0 10 D0712 23:58:56.597816 754382 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:56.606655 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.606708 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 11 D0712 23:58:56.606724 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:56.609549 754382 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.609631 754382 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000a80ab0 12 D0712 23:58:56.609658 754382 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:56.609767 754382 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.609819 754382 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000a80ab0 13 D0712 23:58:56.609848 754382 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:56.609919 754382 task_signals.go:470] [ 626: 626] Notified of signal 23 D0712 23:58:56.610019 754382 task_signals.go:220] [ 626: 626] Signal 23: delivering to handler I0712 23:58:56.617820 754382 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0712 23:58:56.617907 754382 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.617919 754382 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000a80ab0 14 D0712 23:58:56.617934 754382 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:56.617992 754382 task_exit.go:204] [ 626: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.618020 754382 task_exit.go:204] [ 626: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.618041 754382 task_signals.go:204] [ 626: 630] Signal 626, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.618043 754382 task_signals.go:204] [ 626: 628] Signal 626, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.618061 754382 task_exit.go:204] [ 626: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.618092 754382 task_exit.go:204] [ 626: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.618133 754382 task_exit.go:204] [ 626: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.618092 754382 task_signals.go:204] [ 626: 629] Signal 626, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.618156 754382 task_signals.go:204] [ 626: 627] Signal 626, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.618161 754382 task_exit.go:204] [ 626: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.618178 754382 task_exit.go:204] [ 626: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.618203 754382 task_exit.go:204] [ 626: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.618212 754382 task_exit.go:204] [ 626: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.618223 754382 task_exit.go:204] [ 626: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.618301 754382 task_exit.go:204] [ 626: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.618327 754382 task_exit.go:204] [ 626: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.619698 754382 task_exit.go:204] [ 626: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.619740 754382 task_exit.go:204] [ 626: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.619756 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.619786 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.619796 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.619887 754382 task_exit.go:204] [ 626: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.620471 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.622030 754382 syscalls.go:262] [ 631: 631] Allocating stack with size of 8388608 bytes D0712 23:58:56.622137 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.623666 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.623731 754382 usertrap_amd64.go:106] [ 631: 631] Map a usertrap vma at 64000 D0712 23:58:56.623858 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 1 D0712 23:58:56.623910 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:56.624388 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.624418 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 2 D0712 23:58:56.624430 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:56.625284 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.625318 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 3 D0712 23:58:56.625331 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:56.632102 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.632150 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 4 D0712 23:58:56.632166 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:56.633469 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.633505 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 5 D0712 23:58:56.633516 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:56.633584 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.633590 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 6 D0712 23:58:56.633597 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:56.634281 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.634329 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 7 D0712 23:58:56.634341 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:56.634532 754382 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.634566 754382 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc00154a210 8 D0712 23:58:56.634579 754382 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:56.634770 754382 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.634833 754382 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc00154a210 9 D0712 23:58:56.634880 754382 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:56.634991 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.635070 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 10 D0712 23:58:56.635084 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:56.642938 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.642974 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 11 D0712 23:58:56.642990 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:56.645680 754382 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.645723 754382 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc00154a210 12 D0712 23:58:56.645741 754382 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:56.645791 754382 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.645814 754382 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc00154a210 13 D0712 23:58:56.645821 754382 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:56.645894 754382 task_signals.go:470] [ 631: 631] Notified of signal 23 D0712 23:58:56.646028 754382 task_signals.go:220] [ 631: 631] Signal 23: delivering to handler I0712 23:58:56.653334 754382 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0712 23:58:56.653435 754382 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.653455 754382 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00154a210 14 D0712 23:58:56.653465 754382 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:56.653549 754382 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.653573 754382 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.653591 754382 task_signals.go:204] [ 631: 634] Signal 631, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.653606 754382 task_signals.go:204] [ 631: 632] Signal 631, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.653618 754382 task_exit.go:204] [ 631: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.653641 754382 task_exit.go:204] [ 631: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.653639 754382 task_signals.go:204] [ 631: 633] Signal 631, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.653649 754382 task_exit.go:204] [ 631: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.653595 754382 task_signals.go:204] [ 631: 635] Signal 631, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.653661 754382 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.653668 754382 task_exit.go:204] [ 631: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.653689 754382 task_exit.go:204] [ 631: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.653695 754382 task_exit.go:204] [ 631: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.653706 754382 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.653713 754382 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.653732 754382 task_exit.go:204] [ 631: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.654968 754382 task_exit.go:204] [ 631: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.654996 754382 task_exit.go:204] [ 631: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.655015 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.655041 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.655047 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.655170 754382 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.655236 754382 task_signals.go:470] [ 6: 15] Notified of signal 23 D0712 23:58:56.655287 754382 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0712 23:58:56.655827 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.657164 754382 syscalls.go:262] [ 636: 636] Allocating stack with size of 8388608 bytes D0712 23:58:56.657255 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.658669 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.658719 754382 usertrap_amd64.go:106] [ 636: 636] Map a usertrap vma at 64000 D0712 23:58:56.658842 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 1 D0712 23:58:56.658862 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:56.659380 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.659410 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 2 D0712 23:58:56.659422 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:56.660022 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.660049 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 3 D0712 23:58:56.660061 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:56.666290 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.666347 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 4 D0712 23:58:56.666360 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:56.667368 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.667400 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 5 D0712 23:58:56.667414 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:56.667492 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.667510 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 6 D0712 23:58:56.667520 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:56.668034 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.668064 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 7 D0712 23:58:56.668076 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:56.668247 754382 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.668270 754382 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a80870 8 D0712 23:58:56.668279 754382 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:56.668515 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.668544 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 9 D0712 23:58:56.668555 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:56.668575 754382 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.668582 754382 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a80870 10 D0712 23:58:56.668591 754382 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:56.674642 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.674751 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 11 D0712 23:58:56.674778 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:56.680037 754382 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.680070 754382 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a80870 12 D0712 23:58:56.680083 754382 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:56.680211 754382 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.680218 754382 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc000a80870 13 D0712 23:58:56.680224 754382 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:56.680247 754382 task_signals.go:470] [ 636: 636] Notified of signal 23 D0712 23:58:56.680308 754382 task_signals.go:220] [ 636: 636] Signal 23: delivering to handler I0712 23:58:56.683825 754382 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0712 23:58:56.683902 754382 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.683920 754382 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc000a80870 14 D0712 23:58:56.683928 754382 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:56.683959 754382 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.683988 754382 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.684013 754382 task_signals.go:204] [ 636: 639] Signal 636, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.684025 754382 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.684010 754382 task_signals.go:204] [ 636: 638] Signal 636, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.684031 754382 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.684036 754382 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.684050 754382 task_signals.go:204] [ 636: 637] Signal 636, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.684052 754382 task_signals.go:204] [ 636: 640] Signal 636, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.684060 754382 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.684082 754382 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.684090 754382 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.684100 754382 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.684107 754382 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.684135 754382 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.684142 754382 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.685439 754382 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.685472 754382 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.685482 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.685526 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.685532 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.685647 754382 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.686323 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.687598 754382 syscalls.go:262] [ 641: 641] Allocating stack with size of 8388608 bytes D0712 23:58:56.687702 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.690126 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.690160 754382 usertrap_amd64.go:106] [ 641: 641] Map a usertrap vma at 64000 D0712 23:58:56.690233 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 1 D0712 23:58:56.690259 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:56.690699 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.690728 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 2 D0712 23:58:56.690741 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:56.691526 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.691548 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 3 D0712 23:58:56.691555 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:56.700683 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.700709 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 4 D0712 23:58:56.700718 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:56.701695 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.701716 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 5 D0712 23:58:56.701725 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:56.701777 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.701787 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 6 D0712 23:58:56.701792 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:56.702113 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.702130 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 7 D0712 23:58:56.702138 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:56.702387 754382 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.702409 754382 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc000a80900 8 D0712 23:58:56.702419 754382 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:56.702776 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.702805 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 9 D0712 23:58:56.702818 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:56.702879 754382 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.702909 754382 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc000a80900 10 D0712 23:58:56.702923 754382 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:56.710987 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.711012 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 11 D0712 23:58:56.711025 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:56.713536 754382 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.713579 754382 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc000a80900 12 D0712 23:58:56.713601 754382 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:56.713691 754382 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.713707 754382 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc000a80900 13 D0712 23:58:56.713720 754382 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:56.713864 754382 task_signals.go:470] [ 641: 641] Notified of signal 23 D0712 23:58:56.713985 754382 task_signals.go:220] [ 641: 641] Signal 23: delivering to handler D0712 23:58:56.722440 754382 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.722500 754382 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc000a80900 14 D0712 23:58:56.722516 754382 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:56.722590 754382 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.722660 754382 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.722728 754382 task_signals.go:204] [ 641: 645] Signal 641, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.722757 754382 task_signals.go:204] [ 641: 643] Signal 641, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.722764 754382 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.722802 754382 task_signals.go:204] [ 641: 642] Signal 641, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.722846 754382 task_signals.go:204] [ 641: 644] Signal 641, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.722865 754382 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.722885 754382 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.722936 754382 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.723028 754382 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.723045 754382 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.723066 754382 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.723078 754382 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.723125 754382 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.723138 754382 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.725233 754382 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.725320 754382 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.725347 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.725408 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.725446 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.725432 754382 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.725597 754382 task_signals.go:470] [ 6: 15] Notified of signal 23 D0712 23:58:56.725704 754382 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0712 23:58:56.726325 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.727683 754382 syscalls.go:262] [ 646: 646] Allocating stack with size of 8388608 bytes D0712 23:58:56.727822 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.730026 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.730076 754382 usertrap_amd64.go:106] [ 646: 646] Map a usertrap vma at 60000 D0712 23:58:56.730169 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 1 D0712 23:58:56.730197 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:56.730762 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.730786 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 2 D0712 23:58:56.730795 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:56.731449 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.731500 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 3 D0712 23:58:56.731522 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:56.739580 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.739623 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 4 D0712 23:58:56.739643 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:56.740883 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.740935 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 5 D0712 23:58:56.740987 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:56.741101 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.741120 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 6 D0712 23:58:56.741127 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:56.741491 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.741515 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 7 D0712 23:58:56.741525 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:56.741751 754382 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.741797 754382 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00154a300 8 D0712 23:58:56.741813 754382 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:56.741892 754382 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.741907 754382 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00154a300 9 D0712 23:58:56.741915 754382 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:56.742046 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.742073 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 10 D0712 23:58:56.742083 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:56.742269 754382 usertrap_amd64.go:212] [ 646: 649] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:56.742307 754382 usertrap_amd64.go:122] [ 646: 649] Allocate a new trap: 0xc00154a300 11 D0712 23:58:56.742320 754382 usertrap_amd64.go:225] [ 646: 649] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:56.750515 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.750568 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 12 D0712 23:58:56.750583 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:56.753533 754382 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.753674 754382 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00154a300 13 D0712 23:58:56.753715 754382 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:56.753799 754382 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.753808 754382 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00154a300 14 D0712 23:58:56.753818 754382 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:56.753845 754382 task_signals.go:470] [ 646: 646] Notified of signal 23 D0712 23:58:56.753974 754382 task_signals.go:220] [ 646: 646] Signal 23: delivering to handler D0712 23:58:56.755611 754382 sampler.go:191] Time: Adjusting syscall overhead down to 671 I0712 23:58:56.763746 754382 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0712 23:58:56.763830 754382 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.763842 754382 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00154a300 15 D0712 23:58:56.763852 754382 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 23:58:56.763898 754382 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.763937 754382 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.763970 754382 task_signals.go:204] [ 646: 649] Signal 646, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.763998 754382 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.764007 754382 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.764012 754382 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.763955 754382 task_signals.go:204] [ 646: 648] Signal 646, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.764049 754382 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.764103 754382 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.764113 754382 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.764141 754382 task_signals.go:204] [ 646: 650] Signal 646, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.764156 754382 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.764167 754382 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.764175 754382 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.764192 754382 task_signals.go:204] [ 646: 647] Signal 646, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.764219 754382 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.765792 754382 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.765833 754382 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.765848 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.765884 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.765892 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.766018 754382 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.766173 754382 task_signals.go:470] [ 6: 15] Notified of signal 23 D0712 23:58:56.766252 754382 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0712 23:58:56.767000 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.768532 754382 syscalls.go:262] [ 651: 651] Allocating stack with size of 8388608 bytes D0712 23:58:56.768649 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.769940 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.769995 754382 usertrap_amd64.go:106] [ 651: 651] Map a usertrap vma at 62000 D0712 23:58:56.770080 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 1 D0712 23:58:56.770129 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:56.770592 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.770650 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 2 D0712 23:58:56.770668 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:56.771407 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.771430 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 3 D0712 23:58:56.771439 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:56.777714 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.777758 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 4 D0712 23:58:56.777772 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:56.779090 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.779123 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 5 D0712 23:58:56.779136 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:56.779409 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.779432 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 6 D0712 23:58:56.779441 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:56.779687 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.779705 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 7 D0712 23:58:56.779712 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:56.779879 754382 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.779907 754382 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0007208d0 8 D0712 23:58:56.779920 754382 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:56.780213 754382 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.780266 754382 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0007208d0 9 D0712 23:58:56.780280 754382 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:56.780297 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.780323 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 10 D0712 23:58:56.780356 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:56.781051 754382 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.781082 754382 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0007208d0 11 D0712 23:58:56.781097 754382 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:56.781198 754382 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.781228 754382 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0007208d0 12 D0712 23:58:56.781243 754382 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:56.781353 754382 task_signals.go:470] [ 651: 651] Notified of signal 23 D0712 23:58:56.781414 754382 task_signals.go:220] [ 651: 651] Signal 23: delivering to handler D0712 23:58:56.789614 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.789660 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 13 D0712 23:58:56.789673 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:56.792392 754382 task_signals.go:470] [ 651: 651] Notified of signal 23 D0712 23:58:56.792459 754382 task_signals.go:220] [ 651: 651] Signal 23: delivering to handler I0712 23:58:56.801740 754382 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0712 23:58:56.801843 754382 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.801862 754382 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0007208d0 14 D0712 23:58:56.801891 754382 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:56.801979 754382 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.802017 754382 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.802047 754382 task_signals.go:204] [ 651: 654] Signal 651, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.802070 754382 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.802068 754382 task_signals.go:204] [ 651: 652] Signal 651, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.802039 754382 task_signals.go:204] [ 651: 653] Signal 651, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.802079 754382 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.802093 754382 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.802135 754382 task_signals.go:204] [ 651: 655] Signal 651, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.802160 754382 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.802205 754382 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.802215 754382 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.802228 754382 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.802236 754382 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.802242 754382 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.802251 754382 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.803724 754382 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.803759 754382 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.803774 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.803812 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.803823 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.804038 754382 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.804783 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.806424 754382 syscalls.go:262] [ 656: 656] Allocating stack with size of 8388608 bytes D0712 23:58:56.806780 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.807591 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.807628 754382 usertrap_amd64.go:106] [ 656: 656] Map a usertrap vma at 60000 D0712 23:58:56.807729 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 1 D0712 23:58:56.807762 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:56.808068 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.808094 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 2 D0712 23:58:56.808106 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:56.808849 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.808902 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 3 D0712 23:58:56.808924 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:56.815710 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.815759 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 4 D0712 23:58:56.815775 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:56.816863 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.816899 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 5 D0712 23:58:56.816912 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:56.817010 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.817027 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 6 D0712 23:58:56.817035 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:56.817367 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.817383 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 7 D0712 23:58:56.817390 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:56.817541 754382 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.817563 754382 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0019e8e40 8 D0712 23:58:56.817575 754382 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:56.817811 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.817839 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 9 D0712 23:58:56.817849 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:56.817860 754382 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.817867 754382 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0019e8e40 10 D0712 23:58:56.817876 754382 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:56.818467 754382 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.818500 754382 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0019e8e40 11 D0712 23:58:56.818513 754382 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:56.818544 754382 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.818554 754382 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0019e8e40 12 D0712 23:58:56.818560 754382 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:56.818615 754382 task_signals.go:470] [ 656: 656] Notified of signal 23 D0712 23:58:56.818663 754382 task_signals.go:220] [ 656: 656] Signal 23: delivering to handler D0712 23:58:56.825608 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.825645 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 13 D0712 23:58:56.825658 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:56.829910 754382 task_signals.go:470] [ 656: 656] Notified of signal 23 D0712 23:58:56.830090 754382 task_signals.go:220] [ 656: 656] Signal 23: delivering to handler I0712 23:58:56.836184 754382 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0712 23:58:56.836264 754382 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.836277 754382 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0019e8e40 14 D0712 23:58:56.836289 754382 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:56.836364 754382 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.836390 754382 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.836411 754382 task_signals.go:204] [ 656: 659] Signal 656, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.836422 754382 task_exit.go:204] [ 656: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.836428 754382 task_exit.go:204] [ 656: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.836432 754382 task_exit.go:204] [ 656: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.836419 754382 task_signals.go:204] [ 656: 658] Signal 656, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.836449 754382 task_exit.go:204] [ 656: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.836451 754382 task_signals.go:204] [ 656: 657] Signal 656, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.836478 754382 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.836518 754382 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.836545 754382 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.836577 754382 task_signals.go:204] [ 656: 660] Signal 656, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.836628 754382 task_exit.go:204] [ 656: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.836669 754382 task_exit.go:204] [ 656: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.836720 754382 task_exit.go:204] [ 656: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.838132 754382 task_exit.go:204] [ 656: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.838155 754382 task_exit.go:204] [ 656: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.838172 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.838249 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.838281 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.838421 754382 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.839236 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.840585 754382 syscalls.go:262] [ 661: 661] Allocating stack with size of 8388608 bytes D0712 23:58:56.840675 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.841799 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.841841 754382 usertrap_amd64.go:106] [ 661: 661] Map a usertrap vma at 67000 D0712 23:58:56.841946 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 1 D0712 23:58:56.841977 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:56.842345 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.842365 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 2 D0712 23:58:56.842372 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:56.843059 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.843082 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 3 D0712 23:58:56.843095 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:56.849316 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.849348 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 4 D0712 23:58:56.849359 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:56.850522 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.850586 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 5 D0712 23:58:56.850610 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:56.850694 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.850704 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 6 D0712 23:58:56.850715 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:56.851147 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.851167 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 7 D0712 23:58:56.851179 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:56.851399 754382 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.851421 754382 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc000a81740 8 D0712 23:58:56.851432 754382 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:56.851718 754382 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.851766 754382 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc000a81740 9 D0712 23:58:56.851779 754382 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:56.851951 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.851992 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 10 D0712 23:58:56.852006 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:56.859706 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.859733 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 11 D0712 23:58:56.859747 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:56.862323 754382 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.862338 754382 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc000a81740 12 D0712 23:58:56.862354 754382 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:56.862423 754382 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.862489 754382 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc000a81740 13 D0712 23:58:56.862505 754382 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:56.862566 754382 task_signals.go:470] [ 661: 661] Notified of signal 23 D0712 23:58:56.862629 754382 task_signals.go:220] [ 661: 661] Signal 23: delivering to handler D0712 23:58:56.870822 754382 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.870848 754382 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc000a81740 14 D0712 23:58:56.870862 754382 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:56.870938 754382 task_exit.go:204] [ 661: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.870965 754382 task_exit.go:204] [ 661: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.871003 754382 task_signals.go:204] [ 661: 664] Signal 661, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.871028 754382 task_exit.go:204] [ 661: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.871037 754382 task_exit.go:204] [ 661: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.871043 754382 task_exit.go:204] [ 661: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.871029 754382 task_signals.go:204] [ 661: 663] Signal 661, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.871062 754382 task_signals.go:204] [ 661: 665] Signal 661, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.871082 754382 task_exit.go:204] [ 661: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.871175 754382 task_signals.go:204] [ 661: 662] Signal 661, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.871209 754382 task_exit.go:204] [ 661: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.871218 754382 task_exit.go:204] [ 661: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.871240 754382 task_exit.go:204] [ 661: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.871264 754382 task_exit.go:204] [ 661: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.871271 754382 task_exit.go:204] [ 661: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.871282 754382 task_exit.go:204] [ 661: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.872759 754382 task_exit.go:204] [ 661: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.872810 754382 task_exit.go:204] [ 661: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.872829 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.872903 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.872989 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.873061 754382 task_exit.go:204] [ 661: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.874009 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.875509 754382 syscalls.go:262] [ 666: 666] Allocating stack with size of 8388608 bytes D0712 23:58:56.875630 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.877398 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.877471 754382 usertrap_amd64.go:106] [ 666: 666] Map a usertrap vma at 68000 D0712 23:58:56.877762 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 1 D0712 23:58:56.877825 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:56.878215 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.878242 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 2 D0712 23:58:56.878254 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:56.878961 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.878997 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 3 D0712 23:58:56.879010 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:56.885893 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.885923 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 4 D0712 23:58:56.885938 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:56.887040 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.887079 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 5 D0712 23:58:56.887094 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:56.887146 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.887164 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 6 D0712 23:58:56.887180 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:56.887745 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.887776 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 7 D0712 23:58:56.887786 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:56.887977 754382 usertrap_amd64.go:212] [ 666: 667] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.888021 754382 usertrap_amd64.go:122] [ 666: 667] Allocate a new trap: 0xc001205020 8 D0712 23:58:56.888038 754382 usertrap_amd64.go:225] [ 666: 667] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:56.888288 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.888333 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 9 D0712 23:58:56.888348 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:56.888361 754382 usertrap_amd64.go:212] [ 666: 667] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.888367 754382 usertrap_amd64.go:122] [ 666: 667] Allocate a new trap: 0xc001205020 10 D0712 23:58:56.888372 754382 usertrap_amd64.go:225] [ 666: 667] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:56.897362 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.897414 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 11 D0712 23:58:56.897428 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:56.900262 754382 usertrap_amd64.go:212] [ 666: 667] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.900301 754382 usertrap_amd64.go:122] [ 666: 667] Allocate a new trap: 0xc001205020 12 D0712 23:58:56.900314 754382 usertrap_amd64.go:225] [ 666: 667] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:56.900370 754382 usertrap_amd64.go:212] [ 666: 667] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.900381 754382 usertrap_amd64.go:122] [ 666: 667] Allocate a new trap: 0xc001205020 13 D0712 23:58:56.900392 754382 usertrap_amd64.go:225] [ 666: 667] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:56.900410 754382 task_signals.go:470] [ 666: 666] Notified of signal 23 D0712 23:58:56.900501 754382 task_signals.go:220] [ 666: 666] Signal 23: delivering to handler D0712 23:58:56.909006 754382 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.909055 754382 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc001205020 14 D0712 23:58:56.909071 754382 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:56.909089 754382 task_exit.go:204] [ 666: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.909118 754382 task_exit.go:204] [ 666: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.909150 754382 task_signals.go:204] [ 666: 670] Signal 666, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.909141 754382 task_signals.go:204] [ 666: 669] Signal 666, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.909167 754382 task_exit.go:204] [ 666: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.909164 754382 task_signals.go:204] [ 666: 668] Signal 666, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.909221 754382 task_exit.go:204] [ 666: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.909235 754382 task_exit.go:204] [ 666: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.909259 754382 task_signals.go:204] [ 666: 667] Signal 666, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.909268 754382 task_exit.go:204] [ 666: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.909276 754382 task_exit.go:204] [ 666: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.909281 754382 task_exit.go:204] [ 666: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.909292 754382 task_exit.go:204] [ 666: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.909302 754382 task_exit.go:204] [ 666: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.909308 754382 task_exit.go:204] [ 666: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.909321 754382 task_exit.go:204] [ 666: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.910794 754382 task_exit.go:204] [ 666: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.910830 754382 task_exit.go:204] [ 666: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.910848 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.910937 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.911019 754382 task_exit.go:204] [ 666: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.911730 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.913363 754382 syscalls.go:262] [ 671: 671] Allocating stack with size of 8388608 bytes D0712 23:58:56.913485 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.915219 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.915262 754382 usertrap_amd64.go:106] [ 671: 671] Map a usertrap vma at 69000 D0712 23:58:56.915386 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 1 D0712 23:58:56.915427 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:56.915835 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.915899 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 2 D0712 23:58:56.915918 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:56.916759 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.916794 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 3 D0712 23:58:56.916809 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:56.925246 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.925297 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 4 D0712 23:58:56.925316 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:56.927519 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.927569 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 5 D0712 23:58:56.927585 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:56.927645 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.927656 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 6 D0712 23:58:56.927664 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:56.927885 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.927912 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 7 D0712 23:58:56.927920 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:56.928094 754382 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.928119 754382 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc000a81c20 8 D0712 23:58:56.928130 754382 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:56.928482 754382 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.928512 754382 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc000a81c20 9 D0712 23:58:56.928525 754382 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:56.928539 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.928547 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 10 D0712 23:58:56.928557 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:56.928762 754382 usertrap_amd64.go:212] [ 671: 673] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:56.928820 754382 usertrap_amd64.go:122] [ 671: 673] Allocate a new trap: 0xc000a81c20 11 D0712 23:58:56.928851 754382 usertrap_amd64.go:225] [ 671: 673] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:56.937661 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.937696 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 12 D0712 23:58:56.937714 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:56.940573 754382 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.940607 754382 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc000a81c20 13 D0712 23:58:56.940623 754382 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:56.940704 754382 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.940773 754382 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc000a81c20 14 D0712 23:58:56.940837 754382 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:56.940983 754382 task_signals.go:470] [ 671: 671] Notified of signal 23 D0712 23:58:56.941130 754382 task_signals.go:220] [ 671: 671] Signal 23: delivering to handler D0712 23:58:56.949858 754382 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.949915 754382 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc000a81c20 15 D0712 23:58:56.949934 754382 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 23:58:56.950029 754382 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.950061 754382 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.950089 754382 task_signals.go:204] [ 671: 675] Signal 671, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.950103 754382 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.950111 754382 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.950117 754382 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.950138 754382 task_signals.go:204] [ 671: 674] Signal 671, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.950163 754382 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.950153 754382 task_signals.go:204] [ 671: 672] Signal 671, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.950183 754382 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.950192 754382 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.950174 754382 task_signals.go:204] [ 671: 676] Signal 671, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.950240 754382 task_exit.go:204] [ 671: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.950247 754382 task_exit.go:204] [ 671: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.950250 754382 task_exit.go:204] [ 671: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.950091 754382 task_signals.go:204] [ 671: 673] Signal 671, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.950262 754382 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.950270 754382 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.950274 754382 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.950284 754382 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.951707 754382 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.951737 754382 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.951749 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.951808 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:56.951851 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.951993 754382 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.952863 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.954482 754382 syscalls.go:262] [ 677: 677] Allocating stack with size of 8388608 bytes D0712 23:58:56.954617 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.955791 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.955829 754382 usertrap_amd64.go:106] [ 677: 677] Map a usertrap vma at 60000 D0712 23:58:56.955906 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 1 D0712 23:58:56.955941 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:56.956278 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.956305 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 2 D0712 23:58:56.956318 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:56.956799 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.956857 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 3 D0712 23:58:56.956880 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:56.963364 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.963398 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 4 D0712 23:58:56.963410 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:56.964410 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.964440 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 5 D0712 23:58:56.964451 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:56.964492 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.964501 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 6 D0712 23:58:56.964510 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:56.964795 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.964824 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 7 D0712 23:58:56.964835 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:56.965065 754382 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.965082 754382 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001205320 8 D0712 23:58:56.965093 754382 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:56.965320 754382 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.965332 754382 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001205320 9 D0712 23:58:56.965341 754382 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:56.965490 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.965505 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 10 D0712 23:58:56.965513 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:56.973899 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.973937 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 11 D0712 23:58:56.973949 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:56.976890 754382 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.976929 754382 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001205320 12 D0712 23:58:56.976960 754382 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:56.977068 754382 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.977082 754382 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001205320 13 D0712 23:58:56.977091 754382 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:56.977113 754382 task_signals.go:470] [ 677: 677] Notified of signal 23 D0712 23:58:56.977200 754382 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0712 23:58:56.984347 754382 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.984384 754382 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001205320 14 D0712 23:58:56.984403 754382 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:56.984625 754382 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.984667 754382 task_signals.go:204] [ 677: 678] Signal 677, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.984691 754382 task_signals.go:204] [ 677: 681] Signal 677, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.984703 754382 task_signals.go:204] [ 677: 680] Signal 677, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.984704 754382 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.984728 754382 task_signals.go:204] [ 677: 679] Signal 677, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.984746 754382 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.984754 754382 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.984758 754382 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.984774 754382 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.984804 754382 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.984809 754382 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.984822 754382 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.984846 754382 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.984852 754382 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.984863 754382 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.986091 754382 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.986114 754382 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.986123 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:56.986160 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:56.986187 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:56.986267 754382 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.987124 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.989072 754382 syscalls.go:262] [ 682: 682] Allocating stack with size of 8388608 bytes D0712 23:58:56.989249 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.990498 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.990558 754382 usertrap_amd64.go:106] [ 682: 682] Map a usertrap vma at 64000 D0712 23:58:56.990683 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 1 D0712 23:58:56.990730 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:56.991132 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.991154 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 2 D0712 23:58:56.991171 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:56.991768 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.991783 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 3 D0712 23:58:56.991795 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:56.996574 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.996614 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 4 D0712 23:58:56.996630 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:56.997759 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.997816 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 5 D0712 23:58:56.997835 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:56.997900 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.997923 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 6 D0712 23:58:56.997931 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:56.998119 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.998137 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 7 D0712 23:58:56.998142 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:56.998261 754382 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.998276 754382 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000721770 8 D0712 23:58:56.998291 754382 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:56.998455 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.998481 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 9 D0712 23:58:56.998494 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:56.998511 754382 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.998525 754382 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000721770 10 D0712 23:58:56.998534 754382 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:57.005912 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.005936 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 11 D0712 23:58:57.005944 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:57.009326 754382 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.009349 754382 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000721770 12 D0712 23:58:57.009357 754382 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:57.009370 754382 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.009374 754382 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000721770 13 D0712 23:58:57.009381 754382 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:57.009445 754382 task_signals.go:470] [ 682: 682] Notified of signal 23 D0712 23:58:57.009547 754382 task_signals.go:220] [ 682: 682] Signal 23: delivering to handler D0712 23:58:57.014263 754382 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.014293 754382 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000721770 14 D0712 23:58:57.014302 754382 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:57.014345 754382 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.014360 754382 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.014377 754382 task_signals.go:204] [ 682: 683] Signal 682, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.014390 754382 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.014397 754382 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.014401 754382 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.014413 754382 task_signals.go:204] [ 682: 684] Signal 682, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.014433 754382 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.014438 754382 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.014441 754382 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.014433 754382 task_signals.go:204] [ 682: 686] Signal 682, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.014460 754382 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.014474 754382 task_signals.go:204] [ 682: 685] Signal 682, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.014482 754382 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.014487 754382 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.014496 754382 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.015397 754382 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.015422 754382 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.015431 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.015467 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.015655 754382 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.015748 754382 task_signals.go:470] [ 6: 22] Notified of signal 23 D0712 23:58:57.015780 754382 task_signals.go:220] [ 6: 22] Signal 23: delivering to handler D0712 23:58:57.016385 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.017823 754382 syscalls.go:262] [ 687: 687] Allocating stack with size of 8388608 bytes D0712 23:58:57.017967 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.018652 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.018688 754382 usertrap_amd64.go:106] [ 687: 687] Map a usertrap vma at 60000 D0712 23:58:57.018764 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 1 D0712 23:58:57.018821 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.019092 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.019110 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 2 D0712 23:58:57.019117 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.019568 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.019603 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 3 D0712 23:58:57.019617 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.025232 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.025259 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 4 D0712 23:58:57.025268 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.026210 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.026234 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 5 D0712 23:58:57.026242 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.026284 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.026299 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 6 D0712 23:58:57.026304 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.026434 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.026445 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 7 D0712 23:58:57.026450 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.026562 754382 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.026576 754382 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc00137ec90 8 D0712 23:58:57.026582 754382 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.026825 754382 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.026843 754382 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc00137ec90 9 D0712 23:58:57.026849 754382 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.026896 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.026921 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 10 D0712 23:58:57.026936 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.032876 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.032899 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 11 D0712 23:58:57.032906 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.037120 754382 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.037144 754382 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc00137ec90 12 D0712 23:58:57.038426 754382 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.038541 754382 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.038567 754382 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc00137ec90 13 D0712 23:58:57.038578 754382 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.038651 754382 task_signals.go:470] [ 687: 687] Notified of signal 23 D0712 23:58:57.038734 754382 task_signals.go:220] [ 687: 687] Signal 23: delivering to handler D0712 23:58:57.042169 754382 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.042199 754382 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc00137ec90 14 D0712 23:58:57.042210 754382 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.042253 754382 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.042269 754382 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.042299 754382 task_signals.go:204] [ 687: 688] Signal 687, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.042320 754382 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.042330 754382 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.042336 754382 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.042352 754382 task_signals.go:204] [ 687: 689] Signal 687, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.042371 754382 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.042378 754382 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.042384 754382 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.042396 754382 task_signals.go:204] [ 687: 690] Signal 687, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.042413 754382 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.042420 754382 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.042426 754382 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.042437 754382 task_signals.go:204] [ 687: 691] Signal 687, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.042473 754382 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.043370 754382 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.043405 754382 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.043415 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.043458 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.043475 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.043617 754382 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.044504 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.045935 754382 syscalls.go:262] [ 692: 692] Allocating stack with size of 8388608 bytes D0712 23:58:57.046023 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.046922 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.046961 754382 usertrap_amd64.go:106] [ 692: 692] Map a usertrap vma at 60000 D0712 23:58:57.047036 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 1 D0712 23:58:57.047056 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.047312 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.047334 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 2 D0712 23:58:57.047342 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.047705 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.047724 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 3 D0712 23:58:57.047730 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.052908 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.052971 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 4 D0712 23:58:57.052985 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.054138 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.054205 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 5 D0712 23:58:57.054224 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.054297 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.054318 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 6 D0712 23:58:57.054324 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.054656 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.054680 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 7 D0712 23:58:57.054688 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.054844 754382 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.054868 754382 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00137eed0 8 D0712 23:58:57.054878 754382 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.055178 754382 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.055204 754382 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00137eed0 9 D0712 23:58:57.055214 754382 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.055227 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.055234 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 10 D0712 23:58:57.055243 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.055293 754382 usertrap_amd64.go:212] [ 692: 695] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.055309 754382 usertrap_amd64.go:122] [ 692: 695] Allocate a new trap: 0xc00137eed0 11 D0712 23:58:57.055320 754382 usertrap_amd64.go:225] [ 692: 695] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.061757 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.061814 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 12 D0712 23:58:57.061831 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.066221 754382 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.066272 754382 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00137eed0 13 D0712 23:58:57.066284 754382 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.066368 754382 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.066409 754382 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00137eed0 14 D0712 23:58:57.066432 754382 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.066484 754382 task_signals.go:470] [ 692: 692] Notified of signal 23 D0712 23:58:57.066689 754382 task_signals.go:220] [ 692: 692] Signal 23: delivering to handler D0712 23:58:57.071948 754382 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.071975 754382 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00137eed0 15 D0712 23:58:57.071983 754382 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 23:58:57.072035 754382 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.072051 754382 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.072074 754382 task_signals.go:204] [ 692: 693] Signal 692, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.072094 754382 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.072099 754382 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.072102 754382 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.072114 754382 task_signals.go:204] [ 692: 694] Signal 692, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.072120 754382 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.072125 754382 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.072128 754382 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.072137 754382 task_signals.go:204] [ 692: 695] Signal 692, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.072142 754382 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.072155 754382 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.072158 754382 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.072168 754382 task_signals.go:204] [ 692: 696] Signal 692, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.072181 754382 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.072186 754382 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.072189 754382 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.072200 754382 task_signals.go:204] [ 692: 697] Signal 692, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.072206 754382 task_exit.go:204] [ 692: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.072210 754382 task_exit.go:204] [ 692: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.072213 754382 task_exit.go:204] [ 692: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.072223 754382 task_signals.go:204] [ 692: 698] Signal 692, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.072241 754382 task_exit.go:204] [ 692: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.073075 754382 task_exit.go:204] [ 692: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.073095 754382 task_exit.go:204] [ 692: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.073103 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.073151 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.073170 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.073312 754382 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.073938 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.075212 754382 syscalls.go:262] [ 699: 699] Allocating stack with size of 8388608 bytes D0712 23:58:57.075295 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.076405 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.076439 754382 usertrap_amd64.go:106] [ 699: 699] Map a usertrap vma at 68000 D0712 23:58:57.076521 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 1 D0712 23:58:57.076546 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:57.076737 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.076758 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 2 D0712 23:58:57.076766 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:57.077320 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.077347 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 3 D0712 23:58:57.077358 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:57.083019 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.083047 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 4 D0712 23:58:57.083058 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:57.084149 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.084197 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 5 D0712 23:58:57.084218 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:57.084279 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.084298 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 6 D0712 23:58:57.084304 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:57.084554 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.084577 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 7 D0712 23:58:57.084585 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:57.084760 754382 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.084776 754382 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000721bf0 8 D0712 23:58:57.084782 754382 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:57.084963 754382 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.085004 754382 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000721bf0 9 D0712 23:58:57.085018 754382 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:57.085080 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.085090 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 10 D0712 23:58:57.085097 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:57.085632 754382 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.085660 754382 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000721bf0 11 D0712 23:58:57.085672 754382 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:57.085718 754382 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.085741 754382 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000721bf0 12 D0712 23:58:57.085754 754382 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:57.085811 754382 task_signals.go:470] [ 699: 699] Notified of signal 23 D0712 23:58:57.085909 754382 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0712 23:58:57.091882 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.091912 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 13 D0712 23:58:57.091926 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:57.096008 754382 task_signals.go:470] [ 699: 699] Notified of signal 23 D0712 23:58:57.096075 754382 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler I0712 23:58:57.101696 754382 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0712 23:58:57.101804 754382 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.101816 754382 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000721bf0 14 D0712 23:58:57.101827 754382 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:57.101890 754382 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.101926 754382 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.101928 754382 task_signals.go:204] [ 699: 701] Signal 699, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.101948 754382 task_signals.go:204] [ 699: 703] Signal 699, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.101950 754382 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.101997 754382 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.102019 754382 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.102030 754382 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.102037 754382 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.102043 754382 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.102054 754382 task_signals.go:204] [ 699: 704] Signal 699, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.102062 754382 task_exit.go:204] [ 699: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.102068 754382 task_exit.go:204] [ 699: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.102071 754382 task_exit.go:204] [ 699: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.102082 754382 task_signals.go:204] [ 699: 700] Signal 699, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.102096 754382 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.102100 754382 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.102104 754382 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.102112 754382 task_signals.go:204] [ 699: 702] Signal 699, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.102126 754382 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.103211 754382 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.103248 754382 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.103257 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.103282 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.103291 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.103491 754382 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.104074 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.105353 754382 syscalls.go:262] [ 705: 705] Allocating stack with size of 8388608 bytes D0712 23:58:57.105463 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.106419 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.106451 754382 usertrap_amd64.go:106] [ 705: 705] Map a usertrap vma at 68000 D0712 23:58:57.106535 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 1 D0712 23:58:57.106567 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:57.107580 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.107627 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 2 D0712 23:58:57.107641 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:57.108518 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.108549 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 3 D0712 23:58:57.108567 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:57.115126 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.115159 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 4 D0712 23:58:57.115172 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:57.116282 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.116310 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 5 D0712 23:58:57.116322 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:57.116385 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.116393 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 6 D0712 23:58:57.116401 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:57.116746 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.116766 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 7 D0712 23:58:57.116776 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:57.116931 754382 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.116985 754382 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000e28660 8 D0712 23:58:57.116997 754382 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:57.117239 754382 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.117268 754382 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000e28660 9 D0712 23:58:57.117278 754382 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:57.117383 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.117412 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 10 D0712 23:58:57.117422 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:57.124700 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.124735 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 11 D0712 23:58:57.124750 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:57.127690 754382 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.127715 754382 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000e28660 12 D0712 23:58:57.127724 754382 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:57.127735 754382 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.127741 754382 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000e28660 13 D0712 23:58:57.127750 754382 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:57.127801 754382 task_signals.go:470] [ 705: 705] Notified of signal 23 D0712 23:58:57.127872 754382 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0712 23:58:57.134106 754382 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.134141 754382 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000e28660 14 D0712 23:58:57.134156 754382 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:57.134224 754382 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.134258 754382 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.134282 754382 task_signals.go:204] [ 705: 708] Signal 705, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.134297 754382 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.134305 754382 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.134311 754382 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.134279 754382 task_signals.go:204] [ 705: 707] Signal 705, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.134337 754382 task_signals.go:204] [ 705: 709] Signal 705, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.134345 754382 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.134352 754382 task_signals.go:204] [ 705: 706] Signal 705, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.134371 754382 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.134377 754382 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.134388 754382 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.134397 754382 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.134410 754382 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.134421 754382 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.135502 754382 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.135524 754382 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.135534 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.135561 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.135568 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.135697 754382 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.136367 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.137697 754382 syscalls.go:262] [ 710: 710] Allocating stack with size of 8388608 bytes D0712 23:58:57.137785 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.138679 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.138719 754382 usertrap_amd64.go:106] [ 710: 710] Map a usertrap vma at 64000 D0712 23:58:57.139151 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 1 D0712 23:58:57.139200 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:57.139368 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.139384 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 2 D0712 23:58:57.139390 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:57.139845 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.139872 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 3 D0712 23:58:57.139883 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:57.145338 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.145372 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 4 D0712 23:58:57.145393 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:57.146424 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.146453 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 5 D0712 23:58:57.146463 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:57.146520 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.146528 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 6 D0712 23:58:57.146543 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:57.146813 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.146832 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 7 D0712 23:58:57.146839 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:57.146995 754382 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.147028 754382 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc00137f470 8 D0712 23:58:57.147038 754382 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:57.147213 754382 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.147231 754382 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc00137f470 9 D0712 23:58:57.147237 754382 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:57.147270 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.147274 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 10 D0712 23:58:57.147279 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:57.153724 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.153751 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 11 D0712 23:58:57.153764 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:57.157862 754382 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.157891 754382 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc00137f470 12 D0712 23:58:57.157900 754382 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:57.157924 754382 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.157942 754382 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc00137f470 13 D0712 23:58:57.157955 754382 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:57.158098 754382 task_signals.go:470] [ 710: 710] Notified of signal 23 D0712 23:58:57.158182 754382 task_signals.go:220] [ 710: 710] Signal 23: delivering to handler D0712 23:58:57.163743 754382 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.163772 754382 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc00137f470 14 D0712 23:58:57.163784 754382 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:57.163901 754382 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.163944 754382 task_signals.go:204] [ 710: 715] Signal 710, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.163941 754382 task_signals.go:204] [ 710: 714] Signal 710, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.163959 754382 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.163966 754382 task_signals.go:204] [ 710: 713] Signal 710, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.163988 754382 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.164015 754382 task_signals.go:204] [ 710: 711] Signal 710, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.164030 754382 task_signals.go:204] [ 710: 712] Signal 710, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.164045 754382 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.164051 754382 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.164065 754382 task_exit.go:204] [ 710: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.164082 754382 task_exit.go:204] [ 710: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.164088 754382 task_exit.go:204] [ 710: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.164099 754382 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.164106 754382 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.164111 754382 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.164120 754382 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.164128 754382 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.164133 754382 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.164142 754382 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.165152 754382 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.165179 754382 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.165191 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.165256 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.165344 754382 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.166005 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.167476 754382 syscalls.go:262] [ 716: 716] Allocating stack with size of 8388608 bytes D0712 23:58:57.167556 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.168317 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.168356 754382 usertrap_amd64.go:106] [ 716: 716] Map a usertrap vma at 63000 D0712 23:58:57.168430 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 1 D0712 23:58:57.168475 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.168885 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.168911 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 2 D0712 23:58:57.168925 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.169408 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.169466 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 3 D0712 23:58:57.169479 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.174978 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.175024 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 4 D0712 23:58:57.175040 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.176470 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.176496 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 5 D0712 23:58:57.176505 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.176563 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.176582 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 6 D0712 23:58:57.176587 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.177414 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.177435 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 7 D0712 23:58:57.177443 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.177597 754382 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.177622 754382 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc000e28cc0 8 D0712 23:58:57.177634 754382 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.177862 754382 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.177889 754382 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc000e28cc0 9 D0712 23:58:57.177899 754382 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.177914 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.177927 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 10 D0712 23:58:57.177936 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.178446 754382 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.178470 754382 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc000e28cc0 11 D0712 23:58:57.178481 754382 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.178558 754382 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.178580 754382 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc000e28cc0 12 D0712 23:58:57.178592 754382 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.178622 754382 task_signals.go:470] [ 716: 716] Notified of signal 23 D0712 23:58:57.178645 754382 task_signals.go:220] [ 716: 716] Signal 23: delivering to handler D0712 23:58:57.184799 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.184858 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 13 D0712 23:58:57.184878 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.188877 754382 task_signals.go:470] [ 716: 716] Notified of signal 23 D0712 23:58:57.188909 754382 task_signals.go:220] [ 716: 716] Signal 23: delivering to handler D0712 23:58:57.195303 754382 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.195336 754382 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc000e28cc0 14 D0712 23:58:57.195356 754382 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.195430 754382 task_exit.go:204] [ 716: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.195481 754382 task_exit.go:204] [ 716: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.195502 754382 task_signals.go:204] [ 716: 718] Signal 716, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.195518 754382 task_exit.go:204] [ 716: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.195525 754382 task_exit.go:204] [ 716: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.195534 754382 task_exit.go:204] [ 716: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.195548 754382 task_signals.go:204] [ 716: 717] Signal 716, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.195572 754382 task_exit.go:204] [ 716: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.195579 754382 task_exit.go:204] [ 716: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.195585 754382 task_exit.go:204] [ 716: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.195595 754382 task_signals.go:204] [ 716: 719] Signal 716, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.195605 754382 task_exit.go:204] [ 716: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.195612 754382 task_exit.go:204] [ 716: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.195618 754382 task_exit.go:204] [ 716: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.195629 754382 task_signals.go:204] [ 716: 720] Signal 716, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.195637 754382 task_exit.go:204] [ 716: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.195642 754382 task_exit.go:204] [ 716: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.195646 754382 task_exit.go:204] [ 716: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.195667 754382 task_signals.go:204] [ 716: 721] Signal 716, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.195722 754382 task_exit.go:204] [ 716: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.196727 754382 task_exit.go:204] [ 716: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.196757 754382 task_exit.go:204] [ 716: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.196766 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.196786 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.196808 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.196933 754382 task_exit.go:204] [ 716: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.197796 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.199876 754382 syscalls.go:262] [ 722: 722] Allocating stack with size of 8388608 bytes D0712 23:58:57.200000 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.201423 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.201512 754382 usertrap_amd64.go:106] [ 722: 722] Map a usertrap vma at 62000 D0712 23:58:57.201592 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 1 D0712 23:58:57.201621 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:57.202174 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.202244 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 2 D0712 23:58:57.202266 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:57.202987 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.203056 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 3 D0712 23:58:57.203079 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:57.220914 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.220983 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 4 D0712 23:58:57.220999 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:57.222305 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.222370 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 5 D0712 23:58:57.222392 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:57.222466 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.222482 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 6 D0712 23:58:57.222489 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:57.222968 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.222992 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 7 D0712 23:58:57.223000 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:57.223268 754382 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.223289 754382 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001205a70 8 D0712 23:58:57.223299 754382 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:57.223551 754382 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.223572 754382 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001205a70 9 D0712 23:58:57.223585 754382 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:57.223635 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.223656 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 10 D0712 23:58:57.223670 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:57.233273 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.233318 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 11 D0712 23:58:57.233333 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:57.235706 754382 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.235760 754382 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001205a70 12 D0712 23:58:57.235780 754382 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:57.235834 754382 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.235854 754382 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001205a70 13 D0712 23:58:57.235869 754382 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:57.235955 754382 task_signals.go:470] [ 722: 722] Notified of signal 23 D0712 23:58:57.236038 754382 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0712 23:58:57.244056 754382 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.244092 754382 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001205a70 14 D0712 23:58:57.244105 754382 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:57.244166 754382 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.244197 754382 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.244213 754382 task_signals.go:204] [ 722: 725] Signal 722, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.244224 754382 task_signals.go:204] [ 722: 726] Signal 722, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.244235 754382 task_signals.go:204] [ 722: 724] Signal 722, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.244246 754382 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.244260 754382 task_signals.go:204] [ 722: 723] Signal 722, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.244273 754382 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.244290 754382 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.244301 754382 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.244307 754382 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.244311 754382 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.244318 754382 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.244325 754382 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.244332 754382 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.244350 754382 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.246525 754382 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.246555 754382 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.246569 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.247266 754382 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.248176 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.248842 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.248908 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.249695 754382 syscalls.go:262] [ 727: 727] Allocating stack with size of 8388608 bytes D0712 23:58:57.249810 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.251889 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.251925 754382 usertrap_amd64.go:106] [ 727: 727] Map a usertrap vma at 61000 D0712 23:58:57.251986 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 1 D0712 23:58:57.252009 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:57.252337 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.252365 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 2 D0712 23:58:57.252374 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:57.253015 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.253043 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 3 D0712 23:58:57.253053 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:57.259246 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.259294 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 4 D0712 23:58:57.259309 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:57.260483 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.260515 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 5 D0712 23:58:57.260527 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:57.260580 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.260589 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 6 D0712 23:58:57.260598 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:57.261156 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.261191 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 7 D0712 23:58:57.261203 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:57.261347 754382 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.261359 754382 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc000f2e2d0 8 D0712 23:58:57.261369 754382 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:57.261665 754382 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.261699 754382 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc000f2e2d0 9 D0712 23:58:57.261780 754382 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:57.261826 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.261845 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 10 D0712 23:58:57.261854 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:57.269097 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.269133 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 11 D0712 23:58:57.269146 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:57.272086 754382 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.272144 754382 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc000f2e2d0 12 D0712 23:58:57.272163 754382 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:57.272234 754382 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.272266 754382 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc000f2e2d0 13 D0712 23:58:57.272278 754382 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:57.272310 754382 task_signals.go:470] [ 727: 727] Notified of signal 23 D0712 23:58:57.272393 754382 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0712 23:58:57.279572 754382 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.279617 754382 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc000f2e2d0 14 D0712 23:58:57.279634 754382 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:57.279718 754382 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.279755 754382 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.279786 754382 task_signals.go:204] [ 727: 729] Signal 727, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.279811 754382 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.279777 754382 task_signals.go:204] [ 727: 728] Signal 727, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.279777 754382 task_signals.go:204] [ 727: 731] Signal 727, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.279820 754382 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.279838 754382 task_signals.go:204] [ 727: 730] Signal 727, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.279855 754382 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.279883 754382 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.279908 754382 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.279913 754382 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.279920 754382 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.279946 754382 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.279958 754382 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.279967 754382 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.281297 754382 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.281337 754382 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.281354 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.281392 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.281411 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.281508 754382 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.282254 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.283830 754382 syscalls.go:262] [ 732: 732] Allocating stack with size of 8388608 bytes D0712 23:58:57.283961 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.285053 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.285105 754382 usertrap_amd64.go:106] [ 732: 732] Map a usertrap vma at 63000 D0712 23:58:57.287288 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 1 D0712 23:58:57.287366 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.288078 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.288113 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 2 D0712 23:58:57.288124 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.289120 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.289158 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 3 D0712 23:58:57.289173 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.295077 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.295106 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 4 D0712 23:58:57.295118 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.296219 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.296246 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 5 D0712 23:58:57.296254 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.296302 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.296310 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 6 D0712 23:58:57.296325 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.296538 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.296555 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 7 D0712 23:58:57.296561 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.296732 754382 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.296746 754382 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0016141b0 8 D0712 23:58:57.296756 754382 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.296918 754382 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.296974 754382 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0016141b0 9 D0712 23:58:57.296986 754382 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.297191 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.297213 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 10 D0712 23:58:57.297223 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.304510 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.304554 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 11 D0712 23:58:57.304572 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.307771 754382 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.307853 754382 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0016141b0 12 D0712 23:58:57.307876 754382 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.307906 754382 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.307914 754382 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0016141b0 13 D0712 23:58:57.307924 754382 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.307961 754382 task_signals.go:470] [ 732: 732] Notified of signal 23 D0712 23:58:57.308065 754382 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler I0712 23:58:57.315052 754382 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0712 23:58:57.315130 754382 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.315145 754382 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0016141b0 14 D0712 23:58:57.315159 754382 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.315244 754382 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.315275 754382 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.315303 754382 task_signals.go:204] [ 732: 735] Signal 732, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.315325 754382 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.315344 754382 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.315362 754382 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.315319 754382 task_signals.go:204] [ 732: 733] Signal 732, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.315330 754382 task_signals.go:204] [ 732: 734] Signal 732, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.315387 754382 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.315394 754382 task_signals.go:204] [ 732: 736] Signal 732, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.315403 754382 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.315409 754382 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.315439 754382 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.315449 754382 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.315454 754382 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.315464 754382 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.316683 754382 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.316724 754382 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.316738 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.316767 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.316776 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.317034 754382 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.317769 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.319700 754382 syscalls.go:262] [ 737: 737] Allocating stack with size of 8388608 bytes D0712 23:58:57.319939 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.321477 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.321521 754382 usertrap_amd64.go:106] [ 737: 737] Map a usertrap vma at 60000 D0712 23:58:57.321625 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 1 D0712 23:58:57.321653 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.322037 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.322065 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 2 D0712 23:58:57.322074 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.323443 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.323478 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 3 D0712 23:58:57.323494 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.330503 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.330621 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 4 D0712 23:58:57.330660 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.331979 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.332009 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 5 D0712 23:58:57.332023 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.332210 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.332234 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 6 D0712 23:58:57.332246 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.332770 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.332787 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 7 D0712 23:58:57.332797 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.333039 754382 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.333073 754382 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00087ed20 8 D0712 23:58:57.333086 754382 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.333329 754382 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.333352 754382 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00087ed20 9 D0712 23:58:57.333362 754382 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.333579 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.333602 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 10 D0712 23:58:57.333613 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.333742 754382 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.333761 754382 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00087ed20 11 D0712 23:58:57.333771 754382 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.333798 754382 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.333803 754382 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00087ed20 12 D0712 23:58:57.333810 754382 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.333832 754382 task_signals.go:470] [ 737: 740] Notified of signal 23 D0712 23:58:57.333900 754382 task_signals.go:179] [ 737: 740] Restarting syscall 202: interrupted by signal 23 D0712 23:58:57.333913 754382 task_signals.go:220] [ 737: 740] Signal 23: delivering to handler D0712 23:58:57.344087 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.344129 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 13 D0712 23:58:57.344144 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.345099 754382 task_signals.go:470] [ 737: 737] Notified of signal 23 D0712 23:58:57.345215 754382 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler D0712 23:58:57.345477 754382 task_signals.go:470] [ 737: 737] Notified of signal 23 D0712 23:58:57.345756 754382 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler D0712 23:58:57.357700 754382 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.357784 754382 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00087ed20 14 D0712 23:58:57.357818 754382 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.357876 754382 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.357898 754382 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.357928 754382 task_signals.go:204] [ 737: 738] Signal 737, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.357945 754382 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.357954 754382 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.357960 754382 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.357987 754382 task_signals.go:204] [ 737: 739] Signal 737, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.358014 754382 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.358024 754382 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.358039 754382 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.358059 754382 task_signals.go:204] [ 737: 740] Signal 737, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.358091 754382 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.358102 754382 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.358110 754382 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.358131 754382 task_signals.go:204] [ 737: 741] Signal 737, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.358152 754382 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.359792 754382 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.359828 754382 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.359842 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.359868 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.359879 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.360083 754382 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.360775 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.362777 754382 syscalls.go:262] [ 742: 742] Allocating stack with size of 8388608 bytes D0712 23:58:57.362925 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.364588 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.364649 754382 usertrap_amd64.go:106] [ 742: 742] Map a usertrap vma at 66000 D0712 23:58:57.364756 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 1 D0712 23:58:57.364799 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.365329 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.365360 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 2 D0712 23:58:57.365376 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.366187 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.366214 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 3 D0712 23:58:57.366222 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.373556 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.373586 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 4 D0712 23:58:57.373597 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.374982 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.375005 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 5 D0712 23:58:57.375017 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.375082 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.375096 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 6 D0712 23:58:57.375102 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.375539 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.375557 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 7 D0712 23:58:57.375564 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.375696 754382 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.375729 754382 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00027cb40 8 D0712 23:58:57.375745 754382 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.375919 754382 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.375946 754382 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00027cb40 9 D0712 23:58:57.375958 754382 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.375985 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.375993 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 10 D0712 23:58:57.376002 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.384028 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.384112 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 11 D0712 23:58:57.384122 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.387062 754382 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.387096 754382 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00027cb40 12 D0712 23:58:57.387110 754382 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.387276 754382 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.387297 754382 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00027cb40 13 D0712 23:58:57.387307 754382 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.387374 754382 task_signals.go:470] [ 742: 742] Notified of signal 23 D0712 23:58:57.387454 754382 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler I0712 23:58:57.396246 754382 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0712 23:58:57.396321 754382 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.396329 754382 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00027cb40 14 D0712 23:58:57.396338 754382 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.396372 754382 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.396391 754382 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.396407 754382 task_signals.go:204] [ 742: 744] Signal 742, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.396434 754382 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.396452 754382 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.396457 754382 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.396432 754382 task_signals.go:204] [ 742: 746] Signal 742, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.396411 754382 task_signals.go:204] [ 742: 745] Signal 742, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.396474 754382 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.396486 754382 task_signals.go:204] [ 742: 743] Signal 742, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.396506 754382 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.396547 754382 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.396587 754382 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.396599 754382 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.396603 754382 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.396612 754382 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.398289 754382 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.398391 754382 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.398419 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.398484 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.398536 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.398540 754382 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.399157 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.400998 754382 syscalls.go:262] [ 747: 747] Allocating stack with size of 8388608 bytes D0712 23:58:57.401131 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.402628 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.402698 754382 usertrap_amd64.go:106] [ 747: 747] Map a usertrap vma at 64000 D0712 23:58:57.402854 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 1 D0712 23:58:57.402957 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:57.403700 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.403769 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 2 D0712 23:58:57.403787 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:57.404756 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.404789 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 3 D0712 23:58:57.404805 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:57.414225 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.414261 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 4 D0712 23:58:57.414275 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:57.415669 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.415733 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 5 D0712 23:58:57.415759 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:57.415826 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.415842 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 6 D0712 23:58:57.415855 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:57.416578 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.416618 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 7 D0712 23:58:57.416632 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:57.416851 754382 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.416876 754382 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000e29290 8 D0712 23:58:57.416890 754382 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:57.417132 754382 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.417164 754382 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000e29290 9 D0712 23:58:57.417176 754382 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:57.417447 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.417481 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 10 D0712 23:58:57.417500 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:57.418240 754382 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.418279 754382 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000e29290 11 D0712 23:58:57.418301 754382 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:57.418340 754382 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.418354 754382 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000e29290 12 D0712 23:58:57.418432 754382 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:57.418505 754382 task_signals.go:470] [ 747: 747] Notified of signal 23 D0712 23:58:57.418529 754382 task_signals.go:220] [ 747: 747] Signal 23: delivering to handler D0712 23:58:57.427209 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.427252 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 13 D0712 23:58:57.427271 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:57.429176 754382 task_signals.go:470] [ 747: 747] Notified of signal 23 D0712 23:58:57.430257 754382 task_signals.go:220] [ 747: 747] Signal 23: delivering to handler D0712 23:58:57.430476 754382 task_signals.go:470] [ 747: 747] Notified of signal 23 D0712 23:58:57.430564 754382 task_signals.go:220] [ 747: 747] Signal 23: delivering to handler D0712 23:58:57.440268 754382 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.440332 754382 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000e29290 14 D0712 23:58:57.440352 754382 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:57.440447 754382 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.440533 754382 task_signals.go:204] [ 747: 749] Signal 747, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.440558 754382 task_signals.go:204] [ 747: 750] Signal 747, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.440583 754382 task_signals.go:204] [ 747: 751] Signal 747, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.440599 754382 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.440623 754382 task_signals.go:204] [ 747: 748] Signal 747, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.440637 754382 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.440683 754382 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.440692 754382 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.440718 754382 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.440741 754382 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.440746 754382 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.440756 754382 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.440762 754382 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.440766 754382 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.440776 754382 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.442547 754382 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.442591 754382 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.442615 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.442652 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.442661 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.442781 754382 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.443464 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.444896 754382 syscalls.go:262] [ 752: 752] Allocating stack with size of 8388608 bytes D0712 23:58:57.445091 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.446133 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.446188 754382 usertrap_amd64.go:106] [ 752: 752] Map a usertrap vma at 69000 D0712 23:58:57.446275 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 1 D0712 23:58:57.446307 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:57.446833 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.446857 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 2 D0712 23:58:57.446879 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:57.447931 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.447949 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 3 D0712 23:58:57.447959 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:57.454805 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.454843 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 4 D0712 23:58:57.454860 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:57.456046 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.456072 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 5 D0712 23:58:57.456081 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:57.456117 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.456128 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 6 D0712 23:58:57.456134 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:57.456488 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.456511 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 7 D0712 23:58:57.456521 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:57.456681 754382 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.456718 754382 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc000e294a0 8 D0712 23:58:57.456731 754382 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:57.456907 754382 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.456967 754382 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc000e294a0 9 D0712 23:58:57.457078 754382 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:57.457125 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.457136 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 10 D0712 23:58:57.457148 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:57.465277 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.465306 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 11 D0712 23:58:57.465319 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:57.468238 754382 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.468270 754382 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc000e294a0 12 D0712 23:58:57.468285 754382 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:57.468321 754382 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.468350 754382 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc000e294a0 13 D0712 23:58:57.468360 754382 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:57.468412 754382 task_signals.go:470] [ 752: 752] Notified of signal 23 D0712 23:58:57.468512 754382 task_signals.go:220] [ 752: 752] Signal 23: delivering to handler I0712 23:58:57.476262 754382 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0712 23:58:57.476334 754382 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.476343 754382 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc000e294a0 14 D0712 23:58:57.476352 754382 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:57.476376 754382 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.476399 754382 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.476422 754382 task_signals.go:204] [ 752: 756] Signal 752, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.476441 754382 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.476441 754382 task_signals.go:204] [ 752: 755] Signal 752, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.476453 754382 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.476461 754382 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.476423 754382 task_signals.go:204] [ 752: 754] Signal 752, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.476493 754382 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.476510 754382 task_signals.go:204] [ 752: 753] Signal 752, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.476522 754382 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.476529 754382 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.476540 754382 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.476592 754382 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.476614 754382 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.476640 754382 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.478252 754382 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.478279 754382 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.478293 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.478320 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.478362 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.478595 754382 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.479292 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.480814 754382 syscalls.go:262] [ 757: 757] Allocating stack with size of 8388608 bytes D0712 23:58:57.480912 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.482779 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.482833 754382 usertrap_amd64.go:106] [ 757: 757] Map a usertrap vma at 6a000 D0712 23:58:57.482915 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 1 D0712 23:58:57.482950 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:57.483494 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.483536 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 2 D0712 23:58:57.483554 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:57.484334 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.484365 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 3 D0712 23:58:57.484380 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:57.491240 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.491279 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 4 D0712 23:58:57.491294 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:57.492553 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.492578 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 5 D0712 23:58:57.492589 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:57.492653 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.492664 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 6 D0712 23:58:57.492672 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:57.493247 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.493280 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 7 D0712 23:58:57.493291 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:57.493500 754382 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.493518 754382 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc0004e1980 8 D0712 23:58:57.493526 754382 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:57.493684 754382 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.493713 754382 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc0004e1980 9 D0712 23:58:57.493723 754382 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:57.493859 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.493882 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 10 D0712 23:58:57.493893 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:57.502502 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.502540 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 11 D0712 23:58:57.502555 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:57.505420 754382 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.505453 754382 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc0004e1980 12 D0712 23:58:57.505466 754382 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:57.505522 754382 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.505545 754382 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc0004e1980 13 D0712 23:58:57.505554 754382 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:57.505605 754382 task_signals.go:470] [ 757: 757] Notified of signal 23 D0712 23:58:57.505874 754382 task_signals.go:220] [ 757: 757] Signal 23: delivering to handler I0712 23:58:57.514736 754382 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0712 23:58:57.514855 754382 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.514901 754382 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc0004e1980 14 D0712 23:58:57.514923 754382 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:57.515020 754382 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.515052 754382 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.515073 754382 task_signals.go:204] [ 757: 758] Signal 757, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.515086 754382 task_signals.go:204] [ 757: 760] Signal 757, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.515091 754382 task_signals.go:204] [ 757: 761] Signal 757, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.515144 754382 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.515198 754382 task_signals.go:204] [ 757: 759] Signal 757, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.515228 754382 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.515248 754382 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.515295 754382 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.515340 754382 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.515351 754382 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.515371 754382 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.515382 754382 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.515386 754382 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.515396 754382 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.516838 754382 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.516862 754382 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.516875 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.516909 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.516933 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.517126 754382 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.517903 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.519795 754382 syscalls.go:262] [ 762: 762] Allocating stack with size of 8388608 bytes D0712 23:58:57.520076 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.521058 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.521121 754382 usertrap_amd64.go:106] [ 762: 762] Map a usertrap vma at 63000 D0712 23:58:57.521501 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 1 D0712 23:58:57.521534 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.522065 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.522100 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 2 D0712 23:58:57.522116 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.522885 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.522914 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 3 D0712 23:58:57.522927 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.530214 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.530244 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 4 D0712 23:58:57.530254 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.531400 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.531433 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 5 D0712 23:58:57.531447 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.531514 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.531521 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 6 D0712 23:58:57.531527 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.531947 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.531971 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 7 D0712 23:58:57.531990 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.532283 754382 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.532317 754382 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00087f4d0 8 D0712 23:58:57.532330 754382 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.532545 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.532577 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 9 D0712 23:58:57.532590 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.532618 754382 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.532627 754382 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00087f4d0 10 D0712 23:58:57.532638 754382 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.540383 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.540406 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 11 D0712 23:58:57.540417 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.543070 754382 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.543118 754382 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00087f4d0 12 D0712 23:58:57.543137 754382 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.543227 754382 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.543240 754382 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00087f4d0 13 D0712 23:58:57.543252 754382 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.543308 754382 task_signals.go:470] [ 762: 762] Notified of signal 23 D0712 23:58:57.543412 754382 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0712 23:58:57.551681 754382 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.551720 754382 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00087f4d0 14 D0712 23:58:57.551734 754382 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.551793 754382 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.551821 754382 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.551845 754382 task_signals.go:204] [ 762: 766] Signal 762, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.551862 754382 task_signals.go:204] [ 762: 765] Signal 762, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.551873 754382 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.551880 754382 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.551847 754382 task_signals.go:204] [ 762: 764] Signal 762, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.551885 754382 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.551871 754382 task_signals.go:204] [ 762: 763] Signal 762, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.551895 754382 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.551909 754382 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.551915 754382 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.551927 754382 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.551940 754382 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.551958 754382 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.551969 754382 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.553578 754382 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.553621 754382 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.553640 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.553676 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.553689 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.553827 754382 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.554644 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.556317 754382 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0712 23:58:57.556414 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.558051 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.558100 754382 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 69000 D0712 23:58:57.558193 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 1 D0712 23:58:57.558215 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:57.558718 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.558747 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 2 D0712 23:58:57.558758 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:57.559505 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.559538 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 3 D0712 23:58:57.559549 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:57.565863 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.565900 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 4 D0712 23:58:57.565913 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:57.566955 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.566983 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 5 D0712 23:58:57.566993 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:57.567049 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.567069 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 6 D0712 23:58:57.567078 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:57.567333 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.567356 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 7 D0712 23:58:57.567365 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:57.567607 754382 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.567639 754382 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0005facf0 8 D0712 23:58:57.567652 754382 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:57.567840 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.567863 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 9 D0712 23:58:57.567874 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:57.568034 754382 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.568067 754382 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0005facf0 10 D0712 23:58:57.568080 754382 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:57.575807 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.575833 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 11 D0712 23:58:57.575845 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:57.578413 754382 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.578435 754382 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0005facf0 12 D0712 23:58:57.578446 754382 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:57.578531 754382 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.578563 754382 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0005facf0 13 D0712 23:58:57.578578 754382 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:57.578635 754382 task_signals.go:470] [ 767: 767] Notified of signal 23 D0712 23:58:57.578746 754382 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0712 23:58:57.586934 754382 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.586950 754382 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0005facf0 14 D0712 23:58:57.586960 754382 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:57.587037 754382 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.587068 754382 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.587150 754382 task_signals.go:204] [ 767: 772] Signal 767, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.587179 754382 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.587195 754382 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.587251 754382 task_exit.go:204] [ 767: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.587270 754382 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.587296 754382 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.587296 754382 task_exit.go:204] [ 767: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.587321 754382 task_exit.go:204] [ 767: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.587345 754382 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.587368 754382 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.587372 754382 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.587381 754382 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.587389 754382 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.587397 754382 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.587411 754382 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.587425 754382 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.587440 754382 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.587464 754382 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.588774 754382 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.588813 754382 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.588844 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.588885 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.588896 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.588986 754382 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.589713 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.591238 754382 syscalls.go:262] [ 773: 773] Allocating stack with size of 8388608 bytes D0712 23:58:57.591396 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.592297 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.592346 754382 usertrap_amd64.go:106] [ 773: 773] Map a usertrap vma at 60000 D0712 23:58:57.592596 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 1 D0712 23:58:57.592633 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.592985 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.593020 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 2 D0712 23:58:57.593035 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.593868 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.593903 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 3 D0712 23:58:57.593913 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.600404 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.600442 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 4 D0712 23:58:57.600487 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.601707 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.601739 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 5 D0712 23:58:57.601754 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.601826 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.601843 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 6 D0712 23:58:57.601852 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.602139 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.602162 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 7 D0712 23:58:57.602170 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.602342 754382 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.602370 754382 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc000e29c50 8 D0712 23:58:57.602384 754382 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.602713 754382 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.602733 754382 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc000e29c50 9 D0712 23:58:57.602744 754382 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.602755 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.602761 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 10 D0712 23:58:57.602768 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.603038 754382 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.603065 754382 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc000e29c50 11 D0712 23:58:57.603077 754382 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.603113 754382 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.603142 754382 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc000e29c50 12 D0712 23:58:57.603150 754382 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.603196 754382 task_signals.go:470] [ 773: 776] Notified of signal 23 D0712 23:58:57.603227 754382 task_signals.go:179] [ 773: 776] Restarting syscall 202: interrupted by signal 23 D0712 23:58:57.603240 754382 task_signals.go:220] [ 773: 776] Signal 23: delivering to handler D0712 23:58:57.609829 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.609856 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 13 D0712 23:58:57.609864 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.613893 754382 task_signals.go:470] [ 773: 773] Notified of signal 23 D0712 23:58:57.613930 754382 task_signals.go:220] [ 773: 773] Signal 23: delivering to handler D0712 23:58:57.614132 754382 task_signals.go:481] [ 773: 773] No task notified of signal 23 D0712 23:58:57.614170 754382 task_signals.go:220] [ 773: 773] Signal 23: delivering to handler D0712 23:58:57.614307 754382 task_signals.go:481] [ 773: 773] No task notified of signal 23 D0712 23:58:57.614508 754382 task_signals.go:220] [ 773: 773] Signal 23: delivering to handler D0712 23:58:57.620754 754382 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.620784 754382 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc000e29c50 14 D0712 23:58:57.620801 754382 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.620864 754382 task_exit.go:204] [ 773: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.620882 754382 task_exit.go:204] [ 773: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.620886 754382 task_signals.go:204] [ 773: 776] Signal 773, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.620910 754382 task_signals.go:204] [ 773: 777] Signal 773, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.620913 754382 task_signals.go:204] [ 773: 774] Signal 773, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.620923 754382 task_exit.go:204] [ 773: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.620967 754382 task_exit.go:204] [ 773: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.620997 754382 task_signals.go:204] [ 773: 779] Signal 773, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.621027 754382 task_exit.go:204] [ 773: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.621719 754382 task_exit.go:204] [ 773: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.621784 754382 task_signals.go:204] [ 773: 775] Signal 773, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.621810 754382 task_exit.go:204] [ 773: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.621809 754382 task_signals.go:204] [ 773: 778] Signal 773, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.621824 754382 task_exit.go:204] [ 773: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.621869 754382 task_exit.go:204] [ 773: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.621888 754382 task_exit.go:204] [ 773: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.621900 754382 task_exit.go:204] [ 773: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.621913 754382 task_exit.go:204] [ 773: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.621923 754382 task_exit.go:204] [ 773: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.621931 754382 task_exit.go:204] [ 773: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.621954 754382 task_exit.go:204] [ 773: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.622010 754382 task_exit.go:204] [ 773: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.622018 754382 task_exit.go:204] [ 773: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.622031 754382 task_exit.go:204] [ 773: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.623384 754382 task_exit.go:204] [ 773: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.623475 754382 task_exit.go:204] [ 773: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.623499 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.623569 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.623583 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.623704 754382 task_exit.go:204] [ 773: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.624585 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.626046 754382 syscalls.go:262] [ 780: 780] Allocating stack with size of 8388608 bytes D0712 23:58:57.626168 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.628448 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.628491 754382 usertrap_amd64.go:106] [ 780: 780] Map a usertrap vma at 63000 D0712 23:58:57.628600 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 1 D0712 23:58:57.628647 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.629290 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.629367 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 2 D0712 23:58:57.629442 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.630366 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.630395 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 3 D0712 23:58:57.630405 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.638848 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.638920 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 4 D0712 23:58:57.638948 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.640313 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.640383 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 5 D0712 23:58:57.640402 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.640640 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.640711 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 6 D0712 23:58:57.640734 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.641480 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.641540 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 7 D0712 23:58:57.641558 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.641874 754382 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.641905 754382 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc000f2f140 8 D0712 23:58:57.641957 754382 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.642669 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.642698 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 9 D0712 23:58:57.642716 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.642809 754382 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.642846 754382 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc000f2f140 10 D0712 23:58:57.642863 754382 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.653906 754382 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.653972 754382 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc000f2f140 11 D0712 23:58:57.654107 754382 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.654259 754382 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.654296 754382 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc000f2f140 12 D0712 23:58:57.654319 754382 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.654362 754382 task_signals.go:470] [ 780: 780] Notified of signal 23 D0712 23:58:57.654871 754382 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0712 23:58:57.655250 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.655277 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 13 D0712 23:58:57.655289 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.664565 754382 task_signals.go:470] [ 780: 780] Notified of signal 23 D0712 23:58:57.664802 754382 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0712 23:58:57.668738 754382 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.668788 754382 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc000f2f140 14 D0712 23:58:57.668804 754382 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.668865 754382 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.668892 754382 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.668917 754382 task_signals.go:204] [ 780: 782] Signal 780, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.668915 754382 task_signals.go:204] [ 780: 781] Signal 780, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.668934 754382 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.668919 754382 task_signals.go:204] [ 780: 783] Signal 780, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.668987 754382 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.668997 754382 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.669015 754382 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.669034 754382 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.669050 754382 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.669065 754382 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.670575 754382 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.670611 754382 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.670626 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.670657 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.670693 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.670809 754382 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.671637 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.673369 754382 syscalls.go:262] [ 784: 784] Allocating stack with size of 8388608 bytes D0712 23:58:57.673542 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.674841 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.674867 754382 usertrap_amd64.go:106] [ 784: 784] Map a usertrap vma at 66000 D0712 23:58:57.676672 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 1 D0712 23:58:57.676718 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.677124 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.677151 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 2 D0712 23:58:57.677169 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.678033 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.678159 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 3 D0712 23:58:57.678198 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.684817 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.684854 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 4 D0712 23:58:57.684868 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.686111 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.686142 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 5 D0712 23:58:57.686157 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.686326 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.686351 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 6 D0712 23:58:57.686363 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.686857 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.686879 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 7 D0712 23:58:57.686890 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.687144 754382 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.687173 754382 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001614e10 8 D0712 23:58:57.687189 754382 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.687358 754382 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.687407 754382 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001614e10 9 D0712 23:58:57.687437 754382 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.687586 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.687607 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 10 D0712 23:58:57.687617 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.696372 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.696405 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 11 D0712 23:58:57.696418 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.700566 754382 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.700630 754382 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001614e10 12 D0712 23:58:57.700651 754382 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.700736 754382 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.700751 754382 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001614e10 13 D0712 23:58:57.700762 754382 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.700895 754382 task_signals.go:470] [ 784: 784] Notified of signal 23 D0712 23:58:57.701092 754382 task_signals.go:220] [ 784: 784] Signal 23: delivering to handler D0712 23:58:57.710139 754382 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.710198 754382 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001614e10 14 D0712 23:58:57.710214 754382 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.710284 754382 task_exit.go:204] [ 784: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.710305 754382 task_exit.go:204] [ 784: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.710337 754382 task_signals.go:204] [ 784: 785] Signal 784, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.710343 754382 task_signals.go:204] [ 784: 788] Signal 784, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.710364 754382 task_exit.go:204] [ 784: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.710370 754382 task_exit.go:204] [ 784: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.710374 754382 task_exit.go:204] [ 784: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.710385 754382 task_exit.go:204] [ 784: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.710393 754382 task_signals.go:204] [ 784: 786] Signal 784, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.710403 754382 task_exit.go:204] [ 784: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.710368 754382 task_signals.go:204] [ 784: 787] Signal 784, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.710407 754382 task_exit.go:204] [ 784: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.710460 754382 task_exit.go:204] [ 784: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.710487 754382 task_exit.go:204] [ 784: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.710494 754382 task_exit.go:204] [ 784: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.710510 754382 task_exit.go:204] [ 784: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.712234 754382 task_exit.go:204] [ 784: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.712277 754382 task_exit.go:204] [ 784: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.712293 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.712318 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.712451 754382 task_exit.go:204] [ 784: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.713603 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.715484 754382 syscalls.go:262] [ 789: 789] Allocating stack with size of 8388608 bytes D0712 23:58:57.715852 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.717277 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.717329 754382 usertrap_amd64.go:106] [ 789: 789] Map a usertrap vma at 64000 D0712 23:58:57.717435 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 1 D0712 23:58:57.717512 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:57.718155 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.718193 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 2 D0712 23:58:57.718212 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:57.719346 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.719379 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 3 D0712 23:58:57.719418 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:57.728260 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.728323 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 4 D0712 23:58:57.728340 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:57.729770 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.729846 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 5 D0712 23:58:57.729870 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:57.729959 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.729997 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 6 D0712 23:58:57.730009 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:57.730523 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.730553 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 7 D0712 23:58:57.730566 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:57.730912 754382 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.730974 754382 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0005fbb00 8 D0712 23:58:57.730996 754382 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:57.731335 754382 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.731381 754382 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0005fbb00 9 D0712 23:58:57.731399 754382 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:57.731627 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.731674 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 10 D0712 23:58:57.731689 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:57.742585 754382 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.742707 754382 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0005fbb00 11 D0712 23:58:57.742731 754382 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:57.742936 754382 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.742978 754382 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0005fbb00 12 D0712 23:58:57.742995 754382 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:57.743053 754382 task_signals.go:470] [ 789: 789] Notified of signal 23 D0712 23:58:57.743128 754382 task_signals.go:220] [ 789: 789] Signal 23: delivering to handler D0712 23:58:57.743484 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.743558 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 13 D0712 23:58:57.743582 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:57.753711 754382 task_signals.go:470] [ 789: 789] Notified of signal 23 D0712 23:58:57.753845 754382 task_signals.go:220] [ 789: 789] Signal 23: delivering to handler D0712 23:58:57.756473 754382 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0712 23:58:57.757507 754382 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.757579 754382 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0005fbb00 14 D0712 23:58:57.757601 754382 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:57.757681 754382 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.757726 754382 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.757751 754382 task_signals.go:204] [ 789: 792] Signal 789, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.757767 754382 task_signals.go:204] [ 789: 793] Signal 789, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.757776 754382 task_signals.go:204] [ 789: 790] Signal 789, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.757808 754382 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.757887 754382 task_signals.go:204] [ 789: 791] Signal 789, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.757922 754382 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.757930 754382 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.757951 754382 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.757961 754382 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.757967 754382 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.757980 754382 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.758016 754382 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.758025 754382 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.758038 754382 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.759684 754382 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.759726 754382 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.759743 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.759774 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.759782 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.759960 754382 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.761141 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.763193 754382 syscalls.go:262] [ 794: 794] Allocating stack with size of 8388608 bytes D0712 23:58:57.763396 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.764905 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.765050 754382 usertrap_amd64.go:106] [ 794: 794] Map a usertrap vma at 66000 D0712 23:58:57.765176 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 1 D0712 23:58:57.765239 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.765742 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.765783 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 2 D0712 23:58:57.765802 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.767195 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.767230 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 3 D0712 23:58:57.767248 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.775176 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.775243 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 4 D0712 23:58:57.775265 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.776632 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.776678 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 5 D0712 23:58:57.776697 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.776781 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.776792 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 6 D0712 23:58:57.776824 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.777193 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.777217 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 7 D0712 23:58:57.777224 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.777507 754382 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.777586 754382 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0003d0960 8 D0712 23:58:57.777613 754382 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.777855 754382 usertrap_amd64.go:212] [ 794: 796] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.777910 754382 usertrap_amd64.go:122] [ 794: 796] Allocate a new trap: 0xc0003d0960 9 D0712 23:58:57.777931 754382 usertrap_amd64.go:225] [ 794: 796] Apply the binary patch addr 46b6e0 trap addr 662d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.777956 754382 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.777965 754382 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0003d0960 10 D0712 23:58:57.777972 754382 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.778033 754382 usertrap_amd64.go:212] [ 794: 796] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.778049 754382 usertrap_amd64.go:122] [ 794: 796] Allocate a new trap: 0xc0003d0960 11 D0712 23:58:57.778057 754382 usertrap_amd64.go:225] [ 794: 796] Apply the binary patch addr 46b57c trap addr 66370 ([184 202 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.778683 754382 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.778717 754382 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0003d0960 12 D0712 23:58:57.778728 754382 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.778772 754382 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.778785 754382 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0003d0960 13 D0712 23:58:57.778792 754382 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.778819 754382 task_signals.go:470] [ 794: 794] Notified of signal 23 D0712 23:58:57.778900 754382 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0712 23:58:57.787736 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.787775 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 14 D0712 23:58:57.787789 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.790404 754382 task_signals.go:470] [ 794: 794] Notified of signal 23 D0712 23:58:57.790815 754382 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0712 23:58:57.791028 754382 task_signals.go:470] [ 794: 794] Notified of signal 23 D0712 23:58:57.791061 754382 task_signals.go:179] [ 794: 794] Restarting syscall 202: interrupted by signal 23 D0712 23:58:57.791072 754382 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0712 23:58:57.801254 754382 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.801316 754382 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0003d0960 15 D0712 23:58:57.801334 754382 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 23:58:57.801395 754382 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.801424 754382 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.801464 754382 task_signals.go:204] [ 794: 798] Signal 794, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.801487 754382 task_signals.go:204] [ 794: 795] Signal 794, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.801474 754382 task_signals.go:204] [ 794: 797] Signal 794, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.801445 754382 task_signals.go:204] [ 794: 796] Signal 794, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.801497 754382 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.801557 754382 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.801589 754382 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.801623 754382 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.801646 754382 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.801653 754382 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.801668 754382 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.801688 754382 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.801695 754382 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.801714 754382 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.803380 754382 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.803428 754382 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.803483 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.803573 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.803645 754382 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.804145 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:57.804248 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:57.804759 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.806574 754382 syscalls.go:262] [ 799: 799] Allocating stack with size of 8388608 bytes D0712 23:58:57.806703 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.807871 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.807967 754382 usertrap_amd64.go:106] [ 799: 799] Map a usertrap vma at 68000 D0712 23:58:57.808178 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 1 D0712 23:58:57.808260 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:57.808711 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.808735 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 2 D0712 23:58:57.808753 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:57.809623 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.809656 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 3 D0712 23:58:57.809669 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:57.816931 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.817012 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 4 D0712 23:58:57.817030 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:57.818266 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.818289 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 5 D0712 23:58:57.818314 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:57.818383 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.818395 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 6 D0712 23:58:57.818403 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:57.818829 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.818850 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 7 D0712 23:58:57.818857 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:57.819020 754382 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.819077 754382 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001e38270 8 D0712 23:58:57.819101 754382 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:57.819314 754382 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.819349 754382 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001e38270 9 D0712 23:58:57.819366 754382 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:57.819440 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.819463 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 10 D0712 23:58:57.819472 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b6e0 trap addr 68320 ([184 24 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:57.819600 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.819637 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 11 D0712 23:58:57.819649 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b57c trap addr 68370 ([184 202 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:57.827996 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.828026 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 12 D0712 23:58:57.828048 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:57.830819 754382 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.830861 754382 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001e38270 13 D0712 23:58:57.830875 754382 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:57.830948 754382 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.831004 754382 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001e38270 14 D0712 23:58:57.831020 754382 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:57.831091 754382 task_signals.go:470] [ 799: 799] Notified of signal 23 D0712 23:58:57.831181 754382 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0712 23:58:57.839410 754382 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.839441 754382 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001e38270 15 D0712 23:58:57.839453 754382 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 23:58:57.839519 754382 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.839554 754382 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.839576 754382 task_signals.go:204] [ 799: 801] Signal 799, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.839592 754382 task_signals.go:204] [ 799: 800] Signal 799, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.839593 754382 task_signals.go:204] [ 799: 803] Signal 799, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.839631 754382 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.839652 754382 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.839657 754382 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.839574 754382 task_signals.go:204] [ 799: 802] Signal 799, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.839675 754382 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.839737 754382 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.839746 754382 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.839762 754382 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.839781 754382 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.839788 754382 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.839801 754382 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.841247 754382 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.841281 754382 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.841297 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.841334 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.841346 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.841644 754382 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.842494 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.844279 754382 syscalls.go:262] [ 804: 804] Allocating stack with size of 8388608 bytes D0712 23:58:57.844401 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.845971 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.846008 754382 usertrap_amd64.go:106] [ 804: 804] Map a usertrap vma at 63000 D0712 23:58:57.846086 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 1 D0712 23:58:57.846102 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.846398 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.846418 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 2 D0712 23:58:57.846424 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.847138 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.847152 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 3 D0712 23:58:57.847162 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.854786 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.854821 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 4 D0712 23:58:57.854832 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.856201 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.856271 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 5 D0712 23:58:57.856294 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.856366 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.856389 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 6 D0712 23:58:57.856413 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.856926 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.856988 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 7 D0712 23:58:57.857045 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.857295 754382 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.857320 754382 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc0019da090 8 D0712 23:58:57.857334 754382 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.857605 754382 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.857631 754382 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc0019da090 9 D0712 23:58:57.857645 754382 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.857986 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.858014 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 10 D0712 23:58:57.858027 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.858784 754382 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.858816 754382 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc0019da090 11 D0712 23:58:57.858830 754382 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.858916 754382 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.858926 754382 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc0019da090 12 D0712 23:58:57.858942 754382 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.858960 754382 task_signals.go:470] [ 804: 804] Notified of signal 23 D0712 23:58:57.858999 754382 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler D0712 23:58:57.866776 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.866796 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 13 D0712 23:58:57.866805 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.869620 754382 task_signals.go:470] [ 804: 804] Notified of signal 23 D0712 23:58:57.869686 754382 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler D0712 23:58:57.878448 754382 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.878531 754382 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc0019da090 14 D0712 23:58:57.878552 754382 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.878866 754382 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.878915 754382 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.878952 754382 task_signals.go:204] [ 804: 808] Signal 804, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.878958 754382 task_signals.go:204] [ 804: 807] Signal 804, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.878981 754382 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.878976 754382 task_signals.go:204] [ 804: 806] Signal 804, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.879056 754382 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.879075 754382 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.878951 754382 task_signals.go:204] [ 804: 805] Signal 804, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.879106 754382 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.879115 754382 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.879121 754382 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.879142 754382 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.879195 754382 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.879204 754382 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.879245 754382 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.880841 754382 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.880878 754382 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.880895 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.881078 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.881221 754382 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.882256 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.883832 754382 syscalls.go:262] [ 809: 809] Allocating stack with size of 8388608 bytes D0712 23:58:57.883950 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.885822 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.885867 754382 usertrap_amd64.go:106] [ 809: 809] Map a usertrap vma at 60000 D0712 23:58:57.885976 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 1 D0712 23:58:57.885997 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.886335 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.886356 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 2 D0712 23:58:57.886362 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.887293 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.887325 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 3 D0712 23:58:57.887338 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.894016 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.894052 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 4 D0712 23:58:57.894063 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.895209 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.895237 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 5 D0712 23:58:57.895247 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.895314 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.895330 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 6 D0712 23:58:57.895337 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.895730 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.895744 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 7 D0712 23:58:57.895751 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.896005 754382 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.896038 754382 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001e385d0 8 D0712 23:58:57.896052 754382 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.896298 754382 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.896321 754382 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001e385d0 9 D0712 23:58:57.896330 754382 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.896339 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.896343 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 10 D0712 23:58:57.896376 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.906102 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.906141 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 11 D0712 23:58:57.906155 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.906540 754382 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.906568 754382 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001e385d0 12 D0712 23:58:57.906585 754382 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.906619 754382 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.906639 754382 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001e385d0 13 D0712 23:58:57.906648 754382 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.906688 754382 task_signals.go:470] [ 809: 809] Notified of signal 23 D0712 23:58:57.906740 754382 task_signals.go:220] [ 809: 809] Signal 23: delivering to handler D0712 23:58:57.917940 754382 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.917983 754382 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001e385d0 14 D0712 23:58:57.917999 754382 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.918108 754382 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.918145 754382 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.918169 754382 task_signals.go:204] [ 809: 811] Signal 809, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.918166 754382 task_signals.go:204] [ 809: 813] Signal 809, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.918173 754382 task_signals.go:204] [ 809: 810] Signal 809, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.918187 754382 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.918186 754382 task_signals.go:204] [ 809: 812] Signal 809, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.918220 754382 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.918284 754382 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.918329 754382 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.918344 754382 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.918349 754382 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.918359 754382 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.918374 754382 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.918379 754382 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.918386 754382 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.919952 754382 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.919977 754382 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.919993 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.920043 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.920065 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.920331 754382 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.921059 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.923302 754382 syscalls.go:262] [ 814: 814] Allocating stack with size of 8388608 bytes D0712 23:58:57.923555 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.926089 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.926145 754382 usertrap_amd64.go:106] [ 814: 814] Map a usertrap vma at 61000 D0712 23:58:57.926235 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 1 D0712 23:58:57.926259 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:57.926842 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.926913 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 2 D0712 23:58:57.926932 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:57.927936 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.927957 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 3 D0712 23:58:57.927970 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:57.935000 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.935032 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 4 D0712 23:58:57.935043 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:57.936328 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.936365 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 5 D0712 23:58:57.936379 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:57.936454 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.936460 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 6 D0712 23:58:57.936468 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:57.936887 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.936909 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 7 D0712 23:58:57.936917 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:57.937115 754382 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.937142 754382 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001615830 8 D0712 23:58:57.937150 754382 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:57.937346 754382 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.937410 754382 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001615830 9 D0712 23:58:57.937512 754382 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:57.937594 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.937606 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 10 D0712 23:58:57.937633 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:57.937742 754382 usertrap_amd64.go:212] [ 814: 816] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.937775 754382 usertrap_amd64.go:122] [ 814: 816] Allocate a new trap: 0xc001615830 11 D0712 23:58:57.937794 754382 usertrap_amd64.go:225] [ 814: 816] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:57.946605 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.946655 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 12 D0712 23:58:57.946670 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:57.949591 754382 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.949635 754382 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001615830 13 D0712 23:58:57.949658 754382 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:57.949737 754382 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.949777 754382 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001615830 14 D0712 23:58:57.949800 754382 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:57.949840 754382 task_signals.go:470] [ 814: 814] Notified of signal 23 D0712 23:58:57.949945 754382 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0712 23:58:57.958472 754382 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.958529 754382 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001615830 15 D0712 23:58:57.958545 754382 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:58:57.958678 754382 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.958711 754382 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.958738 754382 task_signals.go:204] [ 814: 817] Signal 814, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.958732 754382 task_signals.go:204] [ 814: 816] Signal 814, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.958767 754382 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.958780 754382 task_signals.go:204] [ 814: 818] Signal 814, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.958798 754382 task_signals.go:204] [ 814: 815] Signal 814, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.958831 754382 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.958957 754382 task_signals.go:204] [ 814: 819] Signal 814, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.958992 754382 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.959021 754382 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.959044 754382 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.959061 754382 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.959071 754382 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.959082 754382 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.959103 754382 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.959120 754382 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.959154 754382 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.959169 754382 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.959185 754382 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.960796 754382 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.960841 754382 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.960858 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.960905 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.960989 754382 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.962425 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.964097 754382 syscalls.go:262] [ 820: 820] Allocating stack with size of 8388608 bytes D0712 23:58:57.964210 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.965275 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.965320 754382 usertrap_amd64.go:106] [ 820: 820] Map a usertrap vma at 62000 D0712 23:58:57.965433 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 1 D0712 23:58:57.965462 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:57.966137 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.966170 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 2 D0712 23:58:57.966186 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:57.966894 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.966923 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 3 D0712 23:58:57.966934 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:57.973640 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.973670 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 4 D0712 23:58:57.973682 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:57.974877 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.974902 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 5 D0712 23:58:57.974918 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:57.974999 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.975023 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 6 D0712 23:58:57.975034 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:57.975429 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.975446 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 7 D0712 23:58:57.975454 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:57.975601 754382 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.975627 754382 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001e38ea0 8 D0712 23:58:57.975646 754382 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:57.975902 754382 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.975920 754382 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001e38ea0 9 D0712 23:58:57.975937 754382 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:57.976091 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.976120 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 10 D0712 23:58:57.976134 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:57.983909 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.983940 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 11 D0712 23:58:57.983953 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:57.986488 754382 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.986532 754382 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001e38ea0 12 D0712 23:58:57.986546 754382 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:57.986634 754382 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.986643 754382 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001e38ea0 13 D0712 23:58:57.986656 754382 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:57.986676 754382 task_signals.go:470] [ 820: 820] Notified of signal 23 D0712 23:58:57.986768 754382 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler I0712 23:58:57.995356 754382 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0712 23:58:57.995454 754382 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.995483 754382 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001e38ea0 14 D0712 23:58:57.995494 754382 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:57.995572 754382 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.995608 754382 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.995638 754382 task_signals.go:204] [ 820: 821] Signal 820, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.995649 754382 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.995654 754382 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.995658 754382 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.995678 754382 task_signals.go:204] [ 820: 822] Signal 820, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.995690 754382 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.995699 754382 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.995720 754382 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.995838 754382 task_signals.go:204] [ 820: 823] Signal 820, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.995850 754382 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.995880 754382 task_signals.go:204] [ 820: 824] Signal 820, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.995896 754382 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.995904 754382 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.995918 754382 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.997486 754382 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.997528 754382 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.997544 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:57.997585 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.997608 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:57.997834 754382 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.998892 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.000606 754382 syscalls.go:262] [ 825: 825] Allocating stack with size of 8388608 bytes D0712 23:58:58.000698 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.001766 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.001804 754382 usertrap_amd64.go:106] [ 825: 825] Map a usertrap vma at 63000 D0712 23:58:58.001875 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 1 D0712 23:58:58.001898 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.002394 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.002432 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 2 D0712 23:58:58.002445 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.003080 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.003110 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 3 D0712 23:58:58.003121 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.012448 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.012539 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 4 D0712 23:58:58.012565 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.014105 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.014183 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 5 D0712 23:58:58.014203 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.014293 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.014309 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 6 D0712 23:58:58.014317 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.014762 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.014777 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 7 D0712 23:58:58.014786 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.015236 754382 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.015295 754382 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001e38f90 8 D0712 23:58:58.015313 754382 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.015737 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.015928 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 9 D0712 23:58:58.015975 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.015995 754382 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.016002 754382 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001e38f90 10 D0712 23:58:58.016011 754382 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.025770 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.025839 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 11 D0712 23:58:58.025870 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.029464 754382 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.029528 754382 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001e38f90 12 D0712 23:58:58.029551 754382 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.029613 754382 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.029636 754382 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001e38f90 13 D0712 23:58:58.029647 754382 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.029745 754382 task_signals.go:470] [ 825: 825] Notified of signal 23 D0712 23:58:58.030067 754382 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler I0712 23:58:58.040205 754382 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0712 23:58:58.040375 754382 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.040402 754382 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001e38f90 14 D0712 23:58:58.040423 754382 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.040500 754382 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.040540 754382 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.040589 754382 task_signals.go:204] [ 825: 829] Signal 825, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.040606 754382 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.040617 754382 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.040623 754382 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.040596 754382 task_signals.go:204] [ 825: 827] Signal 825, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.040690 754382 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.040662 754382 task_signals.go:204] [ 825: 828] Signal 825, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.040724 754382 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.040745 754382 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.040664 754382 task_signals.go:204] [ 825: 826] Signal 825, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.040775 754382 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.040807 754382 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.040828 754382 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.040847 754382 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.043016 754382 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.043084 754382 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.043104 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.043269 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.043431 754382 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.045068 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.047641 754382 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0712 23:58:58.048003 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.049292 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.049366 754382 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 60000 D0712 23:58:58.049493 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 1 D0712 23:58:58.049541 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:58.050501 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.050547 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 2 D0712 23:58:58.050567 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:58.052112 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.052159 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 3 D0712 23:58:58.052181 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:58.060606 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.060668 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 4 D0712 23:58:58.060706 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:58.062297 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.062349 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 5 D0712 23:58:58.062369 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:58.062430 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.062445 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 6 D0712 23:58:58.062474 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:58.062812 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.062849 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 7 D0712 23:58:58.062860 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:58.063086 754382 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.063115 754382 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001d6e060 8 D0712 23:58:58.063127 754382 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:58.063315 754382 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.063346 754382 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001d6e060 9 D0712 23:58:58.063359 754382 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:58.063849 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.063897 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 10 D0712 23:58:58.063915 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:58.063990 754382 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.064048 754382 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001d6e060 11 D0712 23:58:58.064069 754382 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:58.064169 754382 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.064179 754382 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001d6e060 12 D0712 23:58:58.064187 754382 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:58.064247 754382 task_signals.go:470] [ 830: 833] Notified of signal 23 D0712 23:58:58.064298 754382 task_signals.go:179] [ 830: 833] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.064311 754382 task_signals.go:220] [ 830: 833] Signal 23: delivering to handler D0712 23:58:58.073860 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.073918 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 13 D0712 23:58:58.073939 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:58.074724 754382 task_signals.go:470] [ 830: 830] Notified of signal 23 D0712 23:58:58.075000 754382 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler D0712 23:58:58.075252 754382 task_signals.go:481] [ 830: 830] No task notified of signal 23 D0712 23:58:58.075344 754382 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler I0712 23:58:58.087736 754382 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0712 23:58:58.087861 754382 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.087899 754382 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001d6e060 14 D0712 23:58:58.087916 754382 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:58.087989 754382 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.088026 754382 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.088061 754382 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.088096 754382 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.088109 754382 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.088113 754382 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.088129 754382 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.088136 754382 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.088114 754382 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.088151 754382 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.088219 754382 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.088239 754382 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.088267 754382 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.088287 754382 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.088294 754382 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.088309 754382 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.090151 754382 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.090192 754382 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.090220 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.090265 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.090284 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.090496 754382 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.091162 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.092809 754382 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0712 23:58:58.093065 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.096251 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.096431 754382 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 6a000 D0712 23:58:58.097092 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 1 D0712 23:58:58.097202 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:58.097877 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.097964 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 2 D0712 23:58:58.097985 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:58.098771 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.098790 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 3 D0712 23:58:58.098801 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:58.114487 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.114564 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 4 D0712 23:58:58.114586 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:58.115909 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.115961 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 5 D0712 23:58:58.115980 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:58.116043 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.116053 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 6 D0712 23:58:58.116078 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:58.116402 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.116431 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 7 D0712 23:58:58.116441 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:58.116752 754382 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.116779 754382 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d6e450 8 D0712 23:58:58.116791 754382 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:58.117011 754382 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.117053 754382 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d6e450 9 D0712 23:58:58.117105 754382 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:58.117134 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.117145 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 10 D0712 23:58:58.117155 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:58.117865 754382 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.117916 754382 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d6e450 11 D0712 23:58:58.117931 754382 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:58.117964 754382 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.117969 754382 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d6e450 12 D0712 23:58:58.117976 754382 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:58.118082 754382 task_signals.go:470] [ 835: 835] Notified of signal 23 D0712 23:58:58.118155 754382 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0712 23:58:58.125430 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.125467 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 13 D0712 23:58:58.125480 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:58.128360 754382 task_signals.go:470] [ 835: 835] Notified of signal 23 D0712 23:58:58.128452 754382 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0712 23:58:58.137387 754382 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.137446 754382 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d6e450 14 D0712 23:58:58.137467 754382 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:58.137530 754382 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.137577 754382 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.137616 754382 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.137617 754382 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.137612 754382 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.137636 754382 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.137696 754382 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.137701 754382 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.137713 754382 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.137755 754382 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.137761 754382 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.137782 754382 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.137791 754382 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.137807 754382 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.137844 754382 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.137876 754382 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.139331 754382 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.139372 754382 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.139390 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.139437 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.139467 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.139615 754382 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.143974 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.146576 754382 syscalls.go:262] [ 840: 840] Allocating stack with size of 8388608 bytes D0712 23:58:58.146740 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.148156 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.148237 754382 usertrap_amd64.go:106] [ 840: 840] Map a usertrap vma at 62000 D0712 23:58:58.148402 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 1 D0712 23:58:58.148449 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:58.149001 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.149058 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 2 D0712 23:58:58.149077 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:58.150009 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.150063 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 3 D0712 23:58:58.150082 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:58.157309 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.157350 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 4 D0712 23:58:58.157365 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:58.158686 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.158708 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 5 D0712 23:58:58.158719 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:58.158847 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.158864 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 6 D0712 23:58:58.158871 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:58.159317 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.159337 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 7 D0712 23:58:58.159343 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:58.159587 754382 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.159618 754382 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc001d6e030 8 D0712 23:58:58.159638 754382 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:58.160009 754382 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.160058 754382 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc001d6e030 9 D0712 23:58:58.160076 754382 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:58.160197 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.160238 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 10 D0712 23:58:58.160283 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:58.169125 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.169188 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 11 D0712 23:58:58.169209 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:58.172105 754382 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.172154 754382 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc001d6e030 12 D0712 23:58:58.172171 754382 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:58.172268 754382 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.172321 754382 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc001d6e030 13 D0712 23:58:58.172340 754382 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:58.172428 754382 task_signals.go:470] [ 840: 840] Notified of signal 23 D0712 23:58:58.172582 754382 task_signals.go:220] [ 840: 840] Signal 23: delivering to handler I0712 23:58:58.181882 754382 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0712 23:58:58.182056 754382 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.182077 754382 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc001d6e030 14 D0712 23:58:58.182093 754382 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:58.182195 754382 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.182236 754382 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.182272 754382 task_signals.go:204] [ 840: 843] Signal 840, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.182297 754382 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.182313 754382 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.182319 754382 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.182325 754382 task_signals.go:204] [ 840: 841] Signal 840, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.182400 754382 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.182305 754382 task_signals.go:204] [ 840: 842] Signal 840, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.182444 754382 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.182453 754382 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.182396 754382 task_signals.go:204] [ 840: 844] Signal 840, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.182467 754382 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.182501 754382 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.182513 754382 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.182539 754382 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.184267 754382 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.184301 754382 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.184319 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.184349 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.184358 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.184529 754382 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.185606 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.187571 754382 syscalls.go:262] [ 845: 845] Allocating stack with size of 8388608 bytes D0712 23:58:58.187966 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.190082 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.190131 754382 usertrap_amd64.go:106] [ 845: 845] Map a usertrap vma at 63000 D0712 23:58:58.190261 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 1 D0712 23:58:58.190393 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.191361 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.191377 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 2 D0712 23:58:58.191388 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.192441 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.192521 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 3 D0712 23:58:58.192543 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.200118 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.200173 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 4 D0712 23:58:58.200189 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.201474 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.201507 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 5 D0712 23:58:58.201518 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.201574 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.201586 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 6 D0712 23:58:58.201594 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.202078 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.202119 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 7 D0712 23:58:58.202129 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.202412 754382 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.202449 754382 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001614240 8 D0712 23:58:58.202465 754382 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.202663 754382 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.202695 754382 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001614240 9 D0712 23:58:58.202702 754382 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.202781 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.202809 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 10 D0712 23:58:58.202820 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.211618 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.211664 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 11 D0712 23:58:58.211676 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.214350 754382 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.214394 754382 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001614240 12 D0712 23:58:58.214407 754382 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.214479 754382 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.214522 754382 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001614240 13 D0712 23:58:58.214537 754382 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.214591 754382 task_signals.go:470] [ 845: 845] Notified of signal 23 D0712 23:58:58.214684 754382 task_signals.go:220] [ 845: 845] Signal 23: delivering to handler I0712 23:58:58.222415 754382 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0712 23:58:58.222543 754382 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.222564 754382 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001614240 14 D0712 23:58:58.222581 754382 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.222664 754382 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222705 754382 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222735 754382 task_signals.go:204] [ 845: 846] Signal 845, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222755 754382 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222761 754382 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222766 754382 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.222786 754382 task_signals.go:204] [ 845: 849] Signal 845, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222807 754382 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222792 754382 task_signals.go:204] [ 845: 847] Signal 845, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222824 754382 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222831 754382 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.222828 754382 task_signals.go:204] [ 845: 848] Signal 845, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222846 754382 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222892 754382 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222901 754382 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.222929 754382 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.224551 754382 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.224572 754382 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.224587 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.224676 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.224720 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.224861 754382 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.225924 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.227830 754382 syscalls.go:262] [ 850: 850] Allocating stack with size of 8388608 bytes D0712 23:58:58.227988 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.229911 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.229992 754382 usertrap_amd64.go:106] [ 850: 850] Map a usertrap vma at 65000 D0712 23:58:58.230129 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 1 D0712 23:58:58.230181 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:58.230916 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.230934 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 2 D0712 23:58:58.230948 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:58.231716 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.231756 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 3 D0712 23:58:58.231773 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:58.242064 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.242130 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 4 D0712 23:58:58.242148 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:58.243358 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.243402 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 5 D0712 23:58:58.243418 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:58.243564 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.243578 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 6 D0712 23:58:58.243585 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:58.243987 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.244011 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 7 D0712 23:58:58.244017 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:58.244350 754382 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.244398 754382 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001d6e750 8 D0712 23:58:58.244419 754382 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:58.244793 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.244827 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 9 D0712 23:58:58.244840 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:58.244871 754382 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.244877 754382 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001d6e750 10 D0712 23:58:58.244883 754382 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:58.245651 754382 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.245687 754382 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001d6e750 11 D0712 23:58:58.245702 754382 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:58.245858 754382 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.245925 754382 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001d6e750 12 D0712 23:58:58.245944 754382 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:58.246044 754382 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 23:58:58.246116 754382 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler D0712 23:58:58.254104 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.254144 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 13 D0712 23:58:58.254158 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:58.257055 754382 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 23:58:58.257162 754382 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler D0712 23:58:58.266363 754382 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.266406 754382 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001d6e750 14 D0712 23:58:58.266421 754382 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:58.266483 754382 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.266520 754382 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.266554 754382 task_signals.go:204] [ 850: 853] Signal 850, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.266552 754382 task_signals.go:204] [ 850: 852] Signal 850, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.266576 754382 task_signals.go:204] [ 850: 851] Signal 850, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.266590 754382 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.266636 754382 task_signals.go:204] [ 850: 854] Signal 850, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.266657 754382 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.266712 754382 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.266737 754382 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.266749 754382 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.266755 754382 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.266768 754382 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.266777 754382 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.266783 754382 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.266798 754382 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.268433 754382 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.268467 754382 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.268486 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.268533 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.268564 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.268862 754382 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.269596 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.271257 754382 syscalls.go:262] [ 855: 855] Allocating stack with size of 8388608 bytes D0712 23:58:58.271430 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.273241 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.273385 754382 usertrap_amd64.go:106] [ 855: 855] Map a usertrap vma at 60000 D0712 23:58:58.273503 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 1 D0712 23:58:58.273545 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:58.274061 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.274096 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 2 D0712 23:58:58.274112 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:58.275123 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.275142 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 3 D0712 23:58:58.275152 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:58.281745 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.281779 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 4 D0712 23:58:58.281791 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:58.283278 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.283315 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 5 D0712 23:58:58.283331 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:58.283380 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.283409 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 6 D0712 23:58:58.283419 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:58.284040 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.284075 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 7 D0712 23:58:58.284089 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:58.284280 754382 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.284319 754382 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001e38480 8 D0712 23:58:58.284335 754382 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:58.284493 754382 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.284542 754382 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001e38480 9 D0712 23:58:58.284561 754382 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:58.284582 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.284592 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 10 D0712 23:58:58.284600 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:58.285471 754382 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.285513 754382 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001e38480 11 D0712 23:58:58.285577 754382 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:58.285664 754382 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.285684 754382 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001e38480 12 D0712 23:58:58.285694 754382 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:58.285754 754382 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 23:58:58.285823 754382 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler D0712 23:58:58.293369 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.293410 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 13 D0712 23:58:58.293428 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:58.298622 754382 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 23:58:58.298774 754382 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler I0712 23:58:58.305260 754382 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0712 23:58:58.305386 754382 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.305404 754382 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001e38480 14 D0712 23:58:58.305418 754382 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:58.305502 754382 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.305532 754382 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.305557 754382 task_signals.go:204] [ 855: 856] Signal 855, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.305581 754382 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.305595 754382 task_signals.go:204] [ 855: 858] Signal 855, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.305631 754382 task_signals.go:204] [ 855: 857] Signal 855, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.305668 754382 task_signals.go:204] [ 855: 859] Signal 855, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.305695 754382 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.305702 754382 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.305715 754382 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.305730 754382 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.305754 754382 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.305762 754382 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.305770 754382 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.305774 754382 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.305783 754382 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.307464 754382 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.307489 754382 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.307502 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.307543 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.307671 754382 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.308358 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.310062 754382 syscalls.go:262] [ 860: 860] Allocating stack with size of 8388608 bytes D0712 23:58:58.310419 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.312298 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.312343 754382 usertrap_amd64.go:106] [ 860: 860] Map a usertrap vma at 65000 D0712 23:58:58.312438 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 1 D0712 23:58:58.312459 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:58.312895 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.312920 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 2 D0712 23:58:58.313004 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:58.314011 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.314043 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 3 D0712 23:58:58.314055 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:58.320864 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.320916 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 4 D0712 23:58:58.320932 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:58.322232 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.322263 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 5 D0712 23:58:58.322276 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:58.322327 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.322340 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 6 D0712 23:58:58.322346 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:58.322807 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.322823 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 7 D0712 23:58:58.322830 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:58.322967 754382 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.322997 754382 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0008b2c00 8 D0712 23:58:58.323009 754382 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:58.323232 754382 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.323266 754382 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0008b2c00 9 D0712 23:58:58.323280 754382 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:58.323366 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.323389 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 10 D0712 23:58:58.323401 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:58.332339 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.332386 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 11 D0712 23:58:58.332408 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:58.335642 754382 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.335705 754382 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0008b2c00 12 D0712 23:58:58.335724 754382 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:58.335748 754382 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.335754 754382 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0008b2c00 13 D0712 23:58:58.335761 754382 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:58.335796 754382 task_signals.go:470] [ 860: 860] Notified of signal 23 D0712 23:58:58.336008 754382 task_signals.go:220] [ 860: 860] Signal 23: delivering to handler I0712 23:58:58.344740 754382 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0712 23:58:58.344851 754382 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.344877 754382 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0008b2c00 14 D0712 23:58:58.344891 754382 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:58.344994 754382 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.345035 754382 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.345068 754382 task_signals.go:204] [ 860: 863] Signal 860, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.345065 754382 task_signals.go:204] [ 860: 862] Signal 860, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.345085 754382 task_signals.go:204] [ 860: 861] Signal 860, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.345093 754382 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.345165 754382 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.345182 754382 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.345198 754382 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.345245 754382 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.345272 754382 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.345294 754382 task_signals.go:204] [ 860: 864] Signal 860, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.345310 754382 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.345318 754382 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.345324 754382 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.345334 754382 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.346804 754382 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.346834 754382 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.346852 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.346876 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.346884 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.347053 754382 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.347810 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.349714 754382 syscalls.go:262] [ 865: 865] Allocating stack with size of 8388608 bytes D0712 23:58:58.350030 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.352675 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.352736 754382 usertrap_amd64.go:106] [ 865: 865] Map a usertrap vma at 62000 D0712 23:58:58.352853 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 1 D0712 23:58:58.352885 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:58.353442 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.353488 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 2 D0712 23:58:58.353507 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:58.354323 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.354355 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 3 D0712 23:58:58.354368 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:58.364303 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.364348 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 4 D0712 23:58:58.364367 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:58.365699 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.365730 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 5 D0712 23:58:58.365741 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:58.365789 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.365795 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 6 D0712 23:58:58.365801 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:58.366159 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.366181 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 7 D0712 23:58:58.366188 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:58.366383 754382 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.366407 754382 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001614c00 8 D0712 23:58:58.366414 754382 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:58.366586 754382 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.366617 754382 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001614c00 9 D0712 23:58:58.366633 754382 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:58.366825 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.366854 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 10 D0712 23:58:58.366865 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:58.367431 754382 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.367456 754382 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001614c00 11 D0712 23:58:58.367467 754382 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:58.367486 754382 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.367493 754382 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001614c00 12 D0712 23:58:58.367501 754382 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:58.367519 754382 task_signals.go:470] [ 865: 865] Notified of signal 23 D0712 23:58:58.367548 754382 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0712 23:58:58.375095 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.375125 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 13 D0712 23:58:58.375135 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:58.378019 754382 task_signals.go:470] [ 865: 865] Notified of signal 23 D0712 23:58:58.378121 754382 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0712 23:58:58.386051 754382 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.386091 754382 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001614c00 14 D0712 23:58:58.386105 754382 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:58.386162 754382 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.386195 754382 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.386226 754382 task_signals.go:204] [ 865: 867] Signal 865, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.386253 754382 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.386255 754382 task_signals.go:204] [ 865: 869] Signal 865, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.386263 754382 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.386277 754382 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.386233 754382 task_signals.go:204] [ 865: 866] Signal 865, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.386296 754382 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.386232 754382 task_signals.go:204] [ 865: 868] Signal 865, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.386309 754382 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.386325 754382 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.386342 754382 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.386371 754382 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.386384 754382 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.386412 754382 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.387835 754382 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.387872 754382 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.387889 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.387915 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.388018 754382 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.388655 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.390775 754382 syscalls.go:262] [ 870: 870] Allocating stack with size of 8388608 bytes D0712 23:58:58.390953 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.391824 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.391861 754382 usertrap_amd64.go:106] [ 870: 870] Map a usertrap vma at 61000 D0712 23:58:58.391933 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 1 D0712 23:58:58.391955 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:58.392247 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.392272 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 2 D0712 23:58:58.392284 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:58.392798 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.392825 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 3 D0712 23:58:58.392837 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:58.398626 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.398656 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 4 D0712 23:58:58.398665 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:58.399776 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.399803 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 5 D0712 23:58:58.399814 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:58.399865 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.399882 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 6 D0712 23:58:58.399890 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:58.400105 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.400127 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 7 D0712 23:58:58.400135 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:58.400275 754382 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.400314 754382 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0019da540 8 D0712 23:58:58.400323 754382 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:58.400487 754382 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:58.400497 754382 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0019da540 9 D0712 23:58:58.400505 754382 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b6e0 trap addr 612d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:58.400523 754382 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.400530 754382 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0019da540 10 D0712 23:58:58.400536 754382 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:58.400577 754382 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.400597 754382 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0019da540 11 D0712 23:58:58.400605 754382 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46af76 trap addr 61370 ([184 35 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:58.408235 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.408270 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 12 D0712 23:58:58.408282 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:58.411260 754382 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.411326 754382 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0019da540 13 D0712 23:58:58.411340 754382 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:58.411512 754382 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.411571 754382 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0019da540 14 D0712 23:58:58.411619 754382 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:58.411700 754382 task_signals.go:470] [ 870: 870] Notified of signal 23 D0712 23:58:58.411840 754382 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0712 23:58:58.420490 754382 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.420559 754382 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0019da540 15 D0712 23:58:58.420593 754382 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:58:58.420695 754382 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.420741 754382 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.420778 754382 task_signals.go:204] [ 870: 873] Signal 870, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.420822 754382 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.420817 754382 task_signals.go:204] [ 870: 874] Signal 870, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.420845 754382 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.420853 754382 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.420742 754382 task_signals.go:204] [ 870: 871] Signal 870, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.420893 754382 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.420904 754382 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.420796 754382 task_signals.go:204] [ 870: 872] Signal 870, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.420910 754382 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.420964 754382 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.420980 754382 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.420986 754382 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.421014 754382 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.422822 754382 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.422849 754382 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.422864 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.422905 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.422921 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.423745 754382 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.423837 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:58.423973 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:58.424482 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.426209 754382 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0712 23:58:58.426471 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.427770 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.427823 754382 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 66000 D0712 23:58:58.427920 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 1 D0712 23:58:58.427957 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:58.428367 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.428402 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 2 D0712 23:58:58.428419 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:58.429311 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.429357 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 3 D0712 23:58:58.429372 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:58.435868 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.435904 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 4 D0712 23:58:58.435919 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:58.437353 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.437392 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 5 D0712 23:58:58.437407 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:58.437459 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.437502 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 6 D0712 23:58:58.437513 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:58.437740 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.437752 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 7 D0712 23:58:58.437761 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:58.437875 754382 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.437887 754382 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001614e70 8 D0712 23:58:58.437896 754382 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:58.438172 754382 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.438224 754382 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001614e70 9 D0712 23:58:58.438240 754382 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:58.438277 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.438287 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 10 D0712 23:58:58.438296 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:58.447605 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.447636 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 11 D0712 23:58:58.447649 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:58.450443 754382 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.450491 754382 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001614e70 12 D0712 23:58:58.450510 754382 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:58.450549 754382 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.450603 754382 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001614e70 13 D0712 23:58:58.450623 754382 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:58.450679 754382 task_signals.go:470] [ 875: 875] Notified of signal 23 D0712 23:58:58.450779 754382 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0712 23:58:58.459423 754382 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.459462 754382 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001614e70 14 D0712 23:58:58.459486 754382 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:58.459553 754382 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.459575 754382 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.459601 754382 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.459624 754382 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.459610 754382 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.459630 754382 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.459646 754382 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.459671 754382 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.459705 754382 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.459783 754382 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.459812 754382 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.459820 754382 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.459835 754382 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.459844 754382 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.459850 754382 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.459861 754382 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.461300 754382 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.461343 754382 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.461390 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.461419 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.461440 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.461549 754382 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.461627 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:58.461760 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:58.462167 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.463580 754382 syscalls.go:262] [ 880: 880] Allocating stack with size of 8388608 bytes D0712 23:58:58.463854 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.465320 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.465370 754382 usertrap_amd64.go:106] [ 880: 880] Map a usertrap vma at 60000 D0712 23:58:58.465454 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 1 D0712 23:58:58.465476 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:58.465846 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.465869 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 2 D0712 23:58:58.465881 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:58.466598 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.466625 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 3 D0712 23:58:58.466638 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) executing program D0712 23:58:58.473226 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.473272 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 4 D0712 23:58:58.473294 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:58.474551 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.474591 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 5 D0712 23:58:58.474609 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:58.474681 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.474712 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 6 D0712 23:58:58.474721 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:58.475228 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.475262 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 7 D0712 23:58:58.475273 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:58.475450 754382 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.475478 754382 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc00093d2f0 8 D0712 23:58:58.475494 754382 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:58.475704 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.475778 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 9 D0712 23:58:58.475809 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:58.475839 754382 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.475855 754382 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc00093d2f0 10 D0712 23:58:58.475864 754382 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:58.475880 754382 usertrap_amd64.go:212] [ 880: 883] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:58.475890 754382 usertrap_amd64.go:122] [ 880: 883] Allocate a new trap: 0xc00093d2f0 11 D0712 23:58:58.475907 754382 usertrap_amd64.go:225] [ 880: 883] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:58.483427 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.483461 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 12 D0712 23:58:58.483474 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:58.486080 754382 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.486112 754382 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc00093d2f0 13 D0712 23:58:58.486126 754382 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:58.486233 754382 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.486315 754382 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc00093d2f0 14 D0712 23:58:58.486339 754382 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:58.486406 754382 task_signals.go:470] [ 880: 880] Notified of signal 23 D0712 23:58:58.486498 754382 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0712 23:58:58.495414 754382 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.495469 754382 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc00093d2f0 15 D0712 23:58:58.495512 754382 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 23:58:58.495613 754382 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495671 754382 task_signals.go:204] [ 880: 884] Signal 880, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495677 754382 task_signals.go:204] [ 880: 881] Signal 880, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495697 754382 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495742 754382 task_signals.go:204] [ 880: 882] Signal 880, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495754 754382 task_signals.go:204] [ 880: 883] Signal 880, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495757 754382 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495773 754382 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495786 754382 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495805 754382 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.495834 754382 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495853 754382 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.495867 754382 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495879 754382 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495892 754382 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.495902 754382 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.497601 754382 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.497665 754382 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.497739 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.497799 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.497811 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.497977 754382 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.498131 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:58.498221 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:58.498858 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.500822 754382 syscalls.go:262] [ 885: 885] Allocating stack with size of 8388608 bytes D0712 23:58:58.501043 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.503713 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.503771 754382 usertrap_amd64.go:106] [ 885: 885] Map a usertrap vma at 69000 D0712 23:58:58.503899 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 1 D0712 23:58:58.503943 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.504378 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.504415 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 2 D0712 23:58:58.504433 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.505235 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.505260 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 3 D0712 23:58:58.505272 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.512614 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.512655 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 4 D0712 23:58:58.512669 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.513991 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.514013 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 5 D0712 23:58:58.514026 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.514308 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.514336 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 6 D0712 23:58:58.514352 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.514826 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.514858 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 7 D0712 23:58:58.514870 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.515157 754382 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.515226 754382 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001d6edb0 8 D0712 23:58:58.515257 754382 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.515507 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.515563 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 9 D0712 23:58:58.515581 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.515597 754382 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.515603 754382 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001d6edb0 10 D0712 23:58:58.515646 754382 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.524689 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.524727 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 11 D0712 23:58:58.524740 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.527643 754382 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.527756 754382 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001d6edb0 12 D0712 23:58:58.527810 754382 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.527885 754382 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.527893 754382 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001d6edb0 13 D0712 23:58:58.527901 754382 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.527919 754382 task_signals.go:470] [ 885: 885] Notified of signal 23 D0712 23:58:58.527999 754382 task_signals.go:220] [ 885: 885] Signal 23: delivering to handler D0712 23:58:58.536876 754382 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.536935 754382 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001d6edb0 14 D0712 23:58:58.536991 754382 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.537076 754382 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.537129 754382 task_signals.go:204] [ 885: 887] Signal 885, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.537179 754382 task_signals.go:204] [ 885: 889] Signal 885, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.537167 754382 task_signals.go:204] [ 885: 888] Signal 885, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.537191 754382 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.537275 754382 task_signals.go:204] [ 885: 886] Signal 885, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.537303 754382 task_signals.go:204] [ 885: 890] Signal 885, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.537332 754382 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.537342 754382 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.537347 754382 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.537359 754382 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.537366 754382 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.537370 754382 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.537378 754382 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.537384 754382 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.537396 754382 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.537426 754382 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.537443 754382 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.537449 754382 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.537458 754382 task_exit.go:204] [ 885: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.538816 754382 task_exit.go:204] [ 885: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.538844 754382 task_exit.go:204] [ 885: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.538866 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.538895 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.538911 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.539085 754382 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.539290 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:58.539425 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:58.540178 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.541630 754382 syscalls.go:262] [ 891: 891] Allocating stack with size of 8388608 bytes D0712 23:58:58.541776 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.542879 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.542917 754382 usertrap_amd64.go:106] [ 891: 891] Map a usertrap vma at 63000 D0712 23:58:58.542991 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 1 D0712 23:58:58.543012 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.543375 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.543404 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 2 D0712 23:58:58.543415 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.544079 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.544107 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 3 D0712 23:58:58.544118 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.550170 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.550209 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 4 D0712 23:58:58.550218 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.551415 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.551446 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 5 D0712 23:58:58.551458 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.551509 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.551519 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 6 D0712 23:58:58.551527 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.552268 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.552298 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 7 D0712 23:58:58.552311 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.552464 754382 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.552517 754382 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0019da630 8 D0712 23:58:58.552529 754382 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.552665 754382 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.552696 754382 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0019da630 9 D0712 23:58:58.552713 754382 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.552859 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.552911 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 10 D0712 23:58:58.552923 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.563025 754382 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.563088 754382 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0019da630 11 D0712 23:58:58.563110 754382 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.563232 754382 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.563259 754382 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0019da630 12 D0712 23:58:58.563347 754382 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.563449 754382 task_signals.go:470] [ 891: 891] Notified of signal 23 D0712 23:58:58.563576 754382 task_signals.go:220] [ 891: 891] Signal 23: delivering to handler D0712 23:58:58.563715 754382 task_signals.go:470] [ 891: 891] Notified of signal 23 D0712 23:58:58.563799 754382 task_signals.go:220] [ 891: 891] Signal 23: delivering to handler D0712 23:58:58.566008 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.566030 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 13 D0712 23:58:58.566043 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.575316 754382 task_signals.go:470] [ 891: 891] Notified of signal 23 D0712 23:58:58.575416 754382 task_signals.go:220] [ 891: 891] Signal 23: delivering to handler D0712 23:58:58.578510 754382 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.578542 754382 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0019da630 14 D0712 23:58:58.578555 754382 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.578606 754382 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.578637 754382 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.578662 754382 task_signals.go:204] [ 891: 892] Signal 891, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.578686 754382 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.578694 754382 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.578700 754382 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.578715 754382 task_signals.go:204] [ 891: 895] Signal 891, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.578746 754382 task_signals.go:204] [ 891: 894] Signal 891, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.578766 754382 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.578777 754382 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.578782 754382 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.578773 754382 task_signals.go:204] [ 891: 893] Signal 891, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.578840 754382 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.578913 754382 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.578935 754382 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.578951 754382 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.580413 754382 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.580455 754382 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.580479 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.580562 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.580588 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.580698 754382 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.581542 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.583762 754382 syscalls.go:262] [ 896: 896] Allocating stack with size of 8388608 bytes D0712 23:58:58.583979 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.586089 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.586126 754382 usertrap_amd64.go:106] [ 896: 896] Map a usertrap vma at 60000 D0712 23:58:58.586227 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 1 D0712 23:58:58.586263 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:58.586860 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.586895 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 2 D0712 23:58:58.586921 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:58.587667 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.587697 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 3 D0712 23:58:58.587711 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:58.594966 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.595003 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 4 D0712 23:58:58.595017 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:58.596316 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.596344 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 5 D0712 23:58:58.596352 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:58.596412 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.596418 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 6 D0712 23:58:58.596427 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:58.596819 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.596839 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 7 D0712 23:58:58.596846 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:58.596987 754382 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.597019 754382 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001e39890 8 D0712 23:58:58.597061 754382 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:58.597362 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.597397 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 9 D0712 23:58:58.597461 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:58.597511 754382 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.597519 754382 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001e39890 10 D0712 23:58:58.597531 754382 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:58.605405 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.605422 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 11 D0712 23:58:58.605431 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:58.608190 754382 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.608223 754382 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001e39890 12 D0712 23:58:58.608244 754382 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:58.608304 754382 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.608350 754382 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001e39890 13 D0712 23:58:58.608361 754382 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:58.608492 754382 task_signals.go:470] [ 896: 896] Notified of signal 23 D0712 23:58:58.608613 754382 task_signals.go:220] [ 896: 896] Signal 23: delivering to handler D0712 23:58:58.616605 754382 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.616634 754382 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001e39890 14 D0712 23:58:58.616648 754382 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:58.616729 754382 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.616761 754382 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.616790 754382 task_signals.go:204] [ 896: 897] Signal 896, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.616813 754382 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.616810 754382 task_signals.go:204] [ 896: 899] Signal 896, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.616823 754382 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.616838 754382 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.616868 754382 task_signals.go:204] [ 896: 900] Signal 896, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.616882 754382 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.616890 754382 task_signals.go:204] [ 896: 898] Signal 896, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.616913 754382 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.616930 754382 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.616972 754382 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.616987 754382 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.617030 754382 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.617048 754382 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.618392 754382 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.618487 754382 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.618536 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.618629 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.618731 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.618884 754382 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.619665 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.621287 754382 syscalls.go:262] [ 901: 901] Allocating stack with size of 8388608 bytes D0712 23:58:58.621705 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.623315 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.623354 754382 usertrap_amd64.go:106] [ 901: 901] Map a usertrap vma at 66000 D0712 23:58:58.623466 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 1 D0712 23:58:58.623496 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:58.624071 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.624120 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 2 D0712 23:58:58.624132 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:58.625062 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.625095 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 3 D0712 23:58:58.625110 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:58.632767 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.632810 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 4 D0712 23:58:58.632828 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:58.634207 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.634249 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 5 D0712 23:58:58.634265 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:58.634389 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.634418 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 6 D0712 23:58:58.634428 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:58.634946 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.634971 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 7 D0712 23:58:58.634981 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:58.635210 754382 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.635237 754382 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00093de90 8 D0712 23:58:58.635248 754382 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:58.635426 754382 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.635462 754382 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00093de90 9 D0712 23:58:58.635477 754382 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:58.635778 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.635802 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 10 D0712 23:58:58.635814 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:58.644551 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.644599 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 11 D0712 23:58:58.644614 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:58.646233 754382 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.646339 754382 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00093de90 12 D0712 23:58:58.646357 754382 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:58.646531 754382 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.646559 754382 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00093de90 13 D0712 23:58:58.646570 754382 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:58.646662 754382 task_signals.go:470] [ 901: 901] Notified of signal 23 D0712 23:58:58.646871 754382 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0712 23:58:58.657788 754382 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.657840 754382 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00093de90 14 D0712 23:58:58.657860 754382 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:58.657946 754382 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.657971 754382 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.658044 754382 task_signals.go:204] [ 901: 902] Signal 901, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.658063 754382 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.658083 754382 task_signals.go:204] [ 901: 904] Signal 901, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.658050 754382 task_signals.go:204] [ 901: 903] Signal 901, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.658122 754382 task_signals.go:204] [ 901: 905] Signal 901, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.658173 754382 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.658189 754382 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.658224 754382 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.658248 754382 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.658267 754382 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.658280 754382 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.658291 754382 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.658311 754382 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.658322 754382 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.659817 754382 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.659849 754382 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.659864 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.659972 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.660010 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.660109 754382 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.660826 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.662606 754382 syscalls.go:262] [ 906: 906] Allocating stack with size of 8388608 bytes D0712 23:58:58.662801 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.665615 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.665756 754382 usertrap_amd64.go:106] [ 906: 906] Map a usertrap vma at 69000 D0712 23:58:58.665901 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 1 D0712 23:58:58.665951 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.666327 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.666358 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 2 D0712 23:58:58.666369 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.667398 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.667428 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 3 D0712 23:58:58.667454 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.674328 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.674368 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 4 D0712 23:58:58.674385 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.675651 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.675685 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 5 D0712 23:58:58.675697 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.675746 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.675765 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 6 D0712 23:58:58.675790 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.676125 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.676201 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 7 D0712 23:58:58.676236 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.676407 754382 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.676430 754382 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001e39b90 8 D0712 23:58:58.676440 754382 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.676582 754382 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.676606 754382 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001e39b90 9 D0712 23:58:58.676620 754382 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.676787 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.676816 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 10 D0712 23:58:58.676864 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.685100 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.685118 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 11 D0712 23:58:58.685130 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.688046 754382 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.688096 754382 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001e39b90 12 D0712 23:58:58.688121 754382 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.688200 754382 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.688253 754382 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001e39b90 13 D0712 23:58:58.688274 754382 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.689011 754382 task_signals.go:470] [ 906: 906] Notified of signal 23 D0712 23:58:58.689140 754382 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0712 23:58:58.697799 754382 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.697836 754382 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001e39b90 14 D0712 23:58:58.697873 754382 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.697946 754382 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.697972 754382 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.698000 754382 task_signals.go:204] [ 906: 909] Signal 906, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.698023 754382 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.698038 754382 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.697998 754382 task_signals.go:204] [ 906: 908] Signal 906, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.698055 754382 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.698075 754382 task_signals.go:204] [ 906: 907] Signal 906, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.698096 754382 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.698137 754382 task_signals.go:204] [ 906: 910] Signal 906, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.698157 754382 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.698166 754382 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.698183 754382 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.698194 754382 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.698213 754382 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.698229 754382 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.699739 754382 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.699765 754382 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.699776 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.699852 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.699903 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.700072 754382 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.701057 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.702761 754382 syscalls.go:262] [ 911: 911] Allocating stack with size of 8388608 bytes D0712 23:58:58.703076 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.704622 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.704670 754382 usertrap_amd64.go:106] [ 911: 911] Map a usertrap vma at 68000 D0712 23:58:58.704807 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 1 D0712 23:58:58.704845 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:58.705323 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.705347 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 2 D0712 23:58:58.705358 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:58.706207 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.706272 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 3 D0712 23:58:58.706296 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:58.713970 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.714035 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 4 D0712 23:58:58.714052 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:58.715352 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.715387 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 5 D0712 23:58:58.715403 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:58.715475 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.715495 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 6 D0712 23:58:58.715507 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:58.715916 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.715938 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 7 D0712 23:58:58.715950 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:58.716196 754382 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.716222 754382 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc000a800c0 8 D0712 23:58:58.716236 754382 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:58.716734 754382 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.716798 754382 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc000a800c0 9 D0712 23:58:58.716829 754382 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:58.716865 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.716906 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 10 D0712 23:58:58.716920 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:58.725899 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.725932 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 11 D0712 23:58:58.725944 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:58.728889 754382 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.728924 754382 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc000a800c0 12 D0712 23:58:58.728973 754382 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:58.729019 754382 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.729039 754382 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc000a800c0 13 D0712 23:58:58.729047 754382 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:58.729082 754382 task_signals.go:470] [ 911: 911] Notified of signal 23 D0712 23:58:58.729165 754382 task_signals.go:220] [ 911: 911] Signal 23: delivering to handler D0712 23:58:58.738222 754382 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.738276 754382 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc000a800c0 14 D0712 23:58:58.738295 754382 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:58.738368 754382 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.738402 754382 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.738426 754382 task_signals.go:204] [ 911: 913] Signal 911, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.738461 754382 task_signals.go:204] [ 911: 915] Signal 911, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.738455 754382 task_signals.go:204] [ 911: 912] Signal 911, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.738464 754382 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.738497 754382 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.738503 754382 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.738442 754382 task_signals.go:204] [ 911: 914] Signal 911, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.738519 754382 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.738524 754382 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.738527 754382 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.738565 754382 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.738642 754382 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.738665 754382 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.738690 754382 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.740167 754382 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.740197 754382 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.740215 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.740445 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.740461 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.740587 754382 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.741992 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.743650 754382 syscalls.go:262] [ 916: 916] Allocating stack with size of 8388608 bytes D0712 23:58:58.743765 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.745374 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.745435 754382 usertrap_amd64.go:106] [ 916: 916] Map a usertrap vma at 66000 D0712 23:58:58.745656 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 1 D0712 23:58:58.745704 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:58.746346 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.746375 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 2 D0712 23:58:58.746389 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:58.747217 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.747251 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 3 D0712 23:58:58.747264 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:58.755957 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.755994 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 4 D0712 23:58:58.756008 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:58.756180 754382 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0712 23:58:58.757571 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.757612 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 5 D0712 23:58:58.757626 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:58.757700 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.757721 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 6 D0712 23:58:58.757733 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:58.758006 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.758024 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 7 D0712 23:58:58.758031 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:58.758207 754382 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.758240 754382 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc000a801e0 8 D0712 23:58:58.758256 754382 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:58.758504 754382 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.758545 754382 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc000a801e0 9 D0712 23:58:58.758580 754382 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:58.758609 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.758631 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 10 D0712 23:58:58.758638 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:58.767990 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.768024 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 11 D0712 23:58:58.768040 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:58.771016 754382 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.771053 754382 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc000a801e0 12 D0712 23:58:58.771068 754382 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:58.771125 754382 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.771131 754382 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc000a801e0 13 D0712 23:58:58.771149 754382 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:58.771206 754382 task_signals.go:470] [ 916: 916] Notified of signal 23 D0712 23:58:58.771416 754382 task_signals.go:220] [ 916: 916] Signal 23: delivering to handler D0712 23:58:58.780295 754382 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.780333 754382 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc000a801e0 14 D0712 23:58:58.780349 754382 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:58.780471 754382 task_exit.go:204] [ 916: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.780505 754382 task_exit.go:204] [ 916: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.780536 754382 task_signals.go:204] [ 916: 919] Signal 916, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.780553 754382 task_exit.go:204] [ 916: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.780538 754382 task_signals.go:204] [ 916: 918] Signal 916, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.780563 754382 task_exit.go:204] [ 916: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.780599 754382 task_exit.go:204] [ 916: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.780559 754382 task_signals.go:204] [ 916: 917] Signal 916, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.780647 754382 task_exit.go:204] [ 916: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.780656 754382 task_signals.go:204] [ 916: 920] Signal 916, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.780674 754382 task_exit.go:204] [ 916: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.780711 754382 task_exit.go:204] [ 916: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.780733 754382 task_exit.go:204] [ 916: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.780752 754382 task_exit.go:204] [ 916: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.780809 754382 task_exit.go:204] [ 916: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.780862 754382 task_exit.go:204] [ 916: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.782273 754382 task_exit.go:204] [ 916: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.782305 754382 task_exit.go:204] [ 916: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.782318 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.782349 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.782362 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.782607 754382 task_exit.go:204] [ 916: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.783279 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.785119 754382 syscalls.go:262] [ 921: 921] Allocating stack with size of 8388608 bytes D0712 23:58:58.785322 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.787219 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.787268 754382 usertrap_amd64.go:106] [ 921: 921] Map a usertrap vma at 64000 D0712 23:58:58.787388 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 1 D0712 23:58:58.787427 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:58.788029 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.788053 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 2 D0712 23:58:58.788062 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:58.788836 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.788861 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 3 D0712 23:58:58.788885 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:58.797275 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.797310 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 4 D0712 23:58:58.797323 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:58.798579 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.798608 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 5 D0712 23:58:58.798619 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:58.798706 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.798712 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 6 D0712 23:58:58.798719 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:58.799003 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.799041 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 7 D0712 23:58:58.799054 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:58.799292 754382 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.799320 754382 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000e40780 8 D0712 23:58:58.799332 754382 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:58.799641 754382 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.799671 754382 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000e40780 9 D0712 23:58:58.799683 754382 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:58.799782 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.799799 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 10 D0712 23:58:58.799806 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:58.809732 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.809755 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 11 D0712 23:58:58.809779 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:58.812701 754382 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.812746 754382 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000e40780 12 D0712 23:58:58.812765 754382 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:58.812839 754382 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.812857 754382 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000e40780 13 D0712 23:58:58.812867 754382 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:58.812905 754382 task_signals.go:470] [ 921: 921] Notified of signal 23 D0712 23:58:58.813061 754382 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0712 23:58:58.822001 754382 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.822032 754382 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000e40780 14 D0712 23:58:58.822049 754382 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:58.822126 754382 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.822161 754382 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.822189 754382 task_signals.go:204] [ 921: 922] Signal 921, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.822182 754382 task_signals.go:204] [ 921: 924] Signal 921, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.822205 754382 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.822204 754382 task_signals.go:204] [ 921: 925] Signal 921, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.822213 754382 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.822219 754382 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.822231 754382 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.822274 754382 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.822279 754382 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.822217 754382 task_signals.go:204] [ 921: 923] Signal 921, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.822303 754382 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.822337 754382 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.822365 754382 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.822388 754382 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.824152 754382 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.824198 754382 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.824218 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.824254 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.824267 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.824386 754382 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.825189 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.827120 754382 syscalls.go:262] [ 926: 926] Allocating stack with size of 8388608 bytes D0712 23:58:58.827248 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.828241 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.828278 754382 usertrap_amd64.go:106] [ 926: 926] Map a usertrap vma at 6a000 D0712 23:58:58.828387 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 1 D0712 23:58:58.828406 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:58.828847 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.828876 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 2 D0712 23:58:58.828888 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:58.829564 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.829592 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 3 D0712 23:58:58.829607 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:58.836721 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.836762 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 4 D0712 23:58:58.836781 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:58.838302 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.838369 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 5 D0712 23:58:58.838388 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:58.838460 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.838497 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 6 D0712 23:58:58.838513 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:58.838988 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.839012 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 7 D0712 23:58:58.839022 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:58.839212 754382 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.839241 754382 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc0003d0870 8 D0712 23:58:58.839254 754382 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:58.839496 754382 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.839518 754382 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc0003d0870 9 D0712 23:58:58.839529 754382 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:58.839706 754382 usertrap_amd64.go:212] [ 926: 929] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.839724 754382 usertrap_amd64.go:122] [ 926: 929] Allocate a new trap: 0xc0003d0870 10 D0712 23:58:58.839736 754382 usertrap_amd64.go:225] [ 926: 929] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:58.848572 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.848625 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 11 D0712 23:58:58.848652 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:58.851830 754382 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.851868 754382 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc0003d0870 12 D0712 23:58:58.851888 754382 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:58.851944 754382 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.851959 754382 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc0003d0870 13 D0712 23:58:58.851967 754382 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:58.851988 754382 task_signals.go:470] [ 926: 926] Notified of signal 23 D0712 23:58:58.852129 754382 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0712 23:58:58.861571 754382 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.861621 754382 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc0003d0870 14 D0712 23:58:58.861635 754382 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:58.861702 754382 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.861743 754382 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.861762 754382 task_signals.go:204] [ 926: 927] Signal 926, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.861797 754382 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.861809 754382 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.861816 754382 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.861775 754382 task_signals.go:204] [ 926: 930] Signal 926, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.861801 754382 task_signals.go:204] [ 926: 929] Signal 926, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.861789 754382 task_signals.go:204] [ 926: 928] Signal 926, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.861840 754382 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.861882 754382 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.861895 754382 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.861919 754382 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.861936 754382 task_signals.go:204] [ 926: 931] Signal 926, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.861951 754382 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.862005 754382 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.862024 754382 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.862044 754382 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.862186 754382 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.862238 754382 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.863534 754382 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.863565 754382 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.863589 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.863629 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.863820 754382 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.864803 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.866824 754382 syscalls.go:262] [ 932: 932] Allocating stack with size of 8388608 bytes D0712 23:58:58.866997 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.868801 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.868850 754382 usertrap_amd64.go:106] [ 932: 932] Map a usertrap vma at 62000 D0712 23:58:58.869038 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 1 D0712 23:58:58.869124 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:58.869717 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.869764 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 2 D0712 23:58:58.869783 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:58.870632 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.870667 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 3 D0712 23:58:58.870681 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:58.877386 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.877441 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 4 D0712 23:58:58.877459 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:58.878885 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.878919 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 5 D0712 23:58:58.878932 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:58.879013 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.879018 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 6 D0712 23:58:58.879024 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:58.879455 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.879482 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 7 D0712 23:58:58.879498 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:58.879821 754382 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.879864 754382 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0003d0b40 8 D0712 23:58:58.879883 754382 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:58.880049 754382 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.880071 754382 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0003d0b40 9 D0712 23:58:58.880082 754382 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:58.880208 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.880230 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 10 D0712 23:58:58.880242 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:58.889038 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.889090 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 11 D0712 23:58:58.889104 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:58.891785 754382 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.891830 754382 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0003d0b40 12 D0712 23:58:58.891849 754382 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:58.892050 754382 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.892114 754382 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0003d0b40 13 D0712 23:58:58.892131 754382 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:58.892210 754382 task_signals.go:470] [ 932: 932] Notified of signal 23 D0712 23:58:58.892298 754382 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0712 23:58:58.901132 754382 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.901176 754382 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0003d0b40 14 D0712 23:58:58.901191 754382 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:58.901324 754382 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.901362 754382 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.901409 754382 task_signals.go:204] [ 932: 936] Signal 932, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.901437 754382 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.901412 754382 task_signals.go:204] [ 932: 934] Signal 932, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.901448 754382 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.901491 754382 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.901533 754382 task_signals.go:204] [ 932: 933] Signal 932, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.901555 754382 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.901573 754382 task_signals.go:204] [ 932: 935] Signal 932, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.901593 754382 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.901602 754382 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.901615 754382 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.901626 754382 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.901633 754382 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.901643 754382 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.903234 754382 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.903259 754382 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.903272 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.903302 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.903308 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.903477 754382 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.903706 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:58.903738 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:58.904456 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.906213 754382 syscalls.go:262] [ 937: 937] Allocating stack with size of 8388608 bytes D0712 23:58:58.906363 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.907171 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.907216 754382 usertrap_amd64.go:106] [ 937: 937] Map a usertrap vma at 67000 D0712 23:58:58.907319 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 1 D0712 23:58:58.907353 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:58.907814 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.907834 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 2 D0712 23:58:58.907845 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:58.908470 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.908491 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 3 D0712 23:58:58.908501 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:58.915020 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.915099 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 4 D0712 23:58:58.915122 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:58.917126 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.917168 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 5 D0712 23:58:58.917183 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:58.917382 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.917407 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 6 D0712 23:58:58.917417 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:58.918207 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.918232 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 7 D0712 23:58:58.918242 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:58.918463 754382 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.918480 754382 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc0019db470 8 D0712 23:58:58.918489 754382 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:58.918670 754382 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.918687 754382 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc0019db470 9 D0712 23:58:58.918699 754382 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:58.918801 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.918824 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 10 D0712 23:58:58.918833 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:58.928283 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.928337 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 11 D0712 23:58:58.928355 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:58.931528 754382 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.931583 754382 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc0019db470 12 D0712 23:58:58.931604 754382 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:58.931692 754382 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.931703 754382 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc0019db470 13 D0712 23:58:58.931723 754382 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:58.931870 754382 task_signals.go:470] [ 937: 937] Notified of signal 23 D0712 23:58:58.932000 754382 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0712 23:58:58.940821 754382 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.940852 754382 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc0019db470 14 D0712 23:58:58.940870 754382 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:58.940928 754382 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.941000 754382 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.941026 754382 task_signals.go:204] [ 937: 941] Signal 937, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.941053 754382 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.941062 754382 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.941075 754382 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.941024 754382 task_signals.go:204] [ 937: 940] Signal 937, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.941091 754382 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.941097 754382 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.941089 754382 task_signals.go:204] [ 937: 939] Signal 937, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.941062 754382 task_signals.go:204] [ 937: 938] Signal 937, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.941103 754382 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.941172 754382 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.941201 754382 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.941211 754382 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.941224 754382 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.942821 754382 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.942860 754382 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.942880 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.942917 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.942956 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.943099 754382 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.943307 754382 task_signals.go:470] [ 6: 6] Notified of signal 23 D0712 23:58:58.943447 754382 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0712 23:58:58.944172 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.945789 754382 syscalls.go:262] [ 942: 942] Allocating stack with size of 8388608 bytes D0712 23:58:58.945915 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.946706 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.946810 754382 usertrap_amd64.go:106] [ 942: 942] Map a usertrap vma at 61000 D0712 23:58:58.947250 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 1 D0712 23:58:58.947294 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:58.947777 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.947796 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 2 D0712 23:58:58.947805 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:58.948581 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.948603 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 3 D0712 23:58:58.948613 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:58.957912 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.957949 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 4 D0712 23:58:58.957968 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:58.959091 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.959123 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 5 D0712 23:58:58.959137 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:58.959211 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.959221 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 6 D0712 23:58:58.959230 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:58.959407 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.959433 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 7 D0712 23:58:58.959443 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:58.959658 754382 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.959697 754382 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d6f950 8 D0712 23:58:58.959709 754382 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:58.959889 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.959910 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 9 D0712 23:58:58.959922 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:58.959937 754382 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.959947 754382 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d6f950 10 D0712 23:58:58.960038 754382 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:58.968836 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.968867 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 11 D0712 23:58:58.968878 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:58.971917 754382 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.971957 754382 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d6f950 12 D0712 23:58:58.971974 754382 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:58.972064 754382 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.972081 754382 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d6f950 13 D0712 23:58:58.972092 754382 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:58.972150 754382 task_signals.go:470] [ 942: 942] Notified of signal 23 D0712 23:58:58.972181 754382 task_signals.go:179] [ 942: 942] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.972194 754382 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler I0712 23:58:58.981670 754382 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0712 23:58:58.981773 754382 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.981800 754382 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d6f950 14 D0712 23:58:58.981812 754382 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:58.981871 754382 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.981894 754382 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.981917 754382 task_signals.go:204] [ 942: 945] Signal 942, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.981940 754382 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.981915 754382 task_signals.go:204] [ 942: 944] Signal 942, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.981949 754382 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.981984 754382 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.982033 754382 task_signals.go:204] [ 942: 946] Signal 942, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.982054 754382 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.982052 754382 task_signals.go:204] [ 942: 943] Signal 942, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.982071 754382 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.982078 754382 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.982092 754382 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.982147 754382 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.982160 754382 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.982178 754382 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.985169 754382 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.985207 754382 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.985224 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:58.985259 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.985268 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:58.985546 754382 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.986415 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.988417 754382 syscalls.go:262] [ 947: 947] Allocating stack with size of 8388608 bytes D0712 23:58:58.988586 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.992864 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.992999 754382 usertrap_amd64.go:106] [ 947: 947] Map a usertrap vma at 67000 D0712 23:58:58.993161 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 1 D0712 23:58:58.993209 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:58.993757 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.993800 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 2 D0712 23:58:58.993814 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:58.994701 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.994756 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 3 D0712 23:58:58.994769 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:59.002449 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.002493 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 4 D0712 23:58:59.002509 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:59.003979 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.004027 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 5 D0712 23:58:59.004045 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:59.004099 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.004117 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 6 D0712 23:58:59.004125 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:59.004342 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.004365 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 7 D0712 23:58:59.004374 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:59.004613 754382 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.004670 754382 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000e41260 8 D0712 23:58:59.004692 754382 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:59.005010 754382 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.005042 754382 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000e41260 9 D0712 23:58:59.005056 754382 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:59.005094 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.005109 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 10 D0712 23:58:59.005122 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:59.013225 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.013278 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 11 D0712 23:58:59.013296 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:59.016233 754382 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.016271 754382 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000e41260 12 D0712 23:58:59.016285 754382 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:59.017141 754382 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.017340 754382 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000e41260 13 D0712 23:58:59.017410 754382 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:59.018453 754382 task_signals.go:470] [ 947: 947] Notified of signal 23 D0712 23:58:59.018624 754382 task_signals.go:220] [ 947: 947] Signal 23: delivering to handler D0712 23:58:59.025041 754382 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.025091 754382 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000e41260 14 D0712 23:58:59.025106 754382 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:59.025164 754382 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.025198 754382 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.025231 754382 task_signals.go:204] [ 947: 948] Signal 947, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.025263 754382 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.025272 754382 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.025279 754382 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.025272 754382 task_signals.go:204] [ 947: 951] Signal 947, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.025294 754382 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.025308 754382 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.025316 754382 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.025258 754382 task_signals.go:204] [ 947: 950] Signal 947, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.025400 754382 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.025449 754382 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.025543 754382 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.025355 754382 task_signals.go:204] [ 947: 949] Signal 947, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.025582 754382 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.026984 754382 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.027019 754382 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.027033 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.027073 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.027100 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.027327 754382 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.036182 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.037931 754382 syscalls.go:262] [ 952: 952] Allocating stack with size of 8388608 bytes D0712 23:58:59.038041 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.041167 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.041216 754382 usertrap_amd64.go:106] [ 952: 952] Map a usertrap vma at 66000 D0712 23:58:59.041354 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 1 D0712 23:58:59.041397 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.042457 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.042496 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 2 D0712 23:58:59.042517 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.042917 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.042944 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 3 D0712 23:58:59.042955 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.050422 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.050479 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 4 D0712 23:58:59.050496 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.051769 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.051808 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 5 D0712 23:58:59.051822 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.051891 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.051903 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 6 D0712 23:58:59.051909 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.052413 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.052438 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 7 D0712 23:58:59.052447 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.052625 754382 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.052647 754382 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000720210 8 D0712 23:58:59.052657 754382 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.052882 754382 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.052923 754382 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000720210 9 D0712 23:58:59.052959 754382 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.053232 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.053267 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 10 D0712 23:58:59.053282 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.053623 754382 usertrap_amd64.go:212] [ 952: 955] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.053661 754382 usertrap_amd64.go:122] [ 952: 955] Allocate a new trap: 0xc000720210 11 D0712 23:58:59.053703 754382 usertrap_amd64.go:225] [ 952: 955] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.065334 754382 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.065370 754382 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000720210 12 D0712 23:58:59.065383 754382 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.065433 754382 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.065438 754382 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000720210 13 D0712 23:58:59.065447 754382 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.065464 754382 task_signals.go:470] [ 952: 952] Notified of signal 23 D0712 23:58:59.065550 754382 task_signals.go:220] [ 952: 952] Signal 23: delivering to handler D0712 23:58:59.070930 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.070968 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 14 D0712 23:58:59.070981 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.075719 754382 task_signals.go:470] [ 952: 952] Notified of signal 23 D0712 23:58:59.077010 754382 task_signals.go:220] [ 952: 952] Signal 23: delivering to handler I0712 23:58:59.083888 754382 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0712 23:58:59.083977 754382 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.083994 754382 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000720210 15 D0712 23:58:59.084012 754382 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 23:58:59.084094 754382 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.084123 754382 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.084146 754382 task_signals.go:204] [ 952: 956] Signal 952, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.084139 754382 task_signals.go:204] [ 952: 953] Signal 952, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.084167 754382 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.084156 754382 task_signals.go:204] [ 952: 955] Signal 952, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.084219 754382 task_signals.go:204] [ 952: 954] Signal 952, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.084240 754382 task_signals.go:204] [ 952: 957] Signal 952, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.084265 754382 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.084310 754382 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.084317 754382 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.084333 754382 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.084356 754382 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.084361 754382 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.084373 754382 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.084416 754382 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.084440 754382 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.084471 754382 task_exit.go:204] [ 952: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.084597 754382 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.084611 754382 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.085998 754382 task_exit.go:204] [ 952: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.086035 754382 task_exit.go:204] [ 952: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.086059 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.086092 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.086103 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.086295 754382 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.086795 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.088329 754382 syscalls.go:262] [ 958: 958] Allocating stack with size of 8388608 bytes D0712 23:58:59.088421 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.090292 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.090330 754382 usertrap_amd64.go:106] [ 958: 958] Map a usertrap vma at 60000 D0712 23:58:59.090440 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 1 D0712 23:58:59.090474 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:59.090904 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.090923 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 2 D0712 23:58:59.090932 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:59.091547 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.091566 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 3 D0712 23:58:59.091573 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:59.097766 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.097809 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 4 D0712 23:58:59.097829 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:59.099270 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.099303 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 5 D0712 23:58:59.099317 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:59.099484 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.099498 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 6 D0712 23:58:59.099507 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:59.099869 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.099902 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 7 D0712 23:58:59.099914 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:59.100125 754382 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.100149 754382 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00137e060 8 D0712 23:58:59.100160 754382 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:59.100395 754382 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.100422 754382 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00137e060 9 D0712 23:58:59.100433 754382 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:59.100694 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.100722 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 10 D0712 23:58:59.100733 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:59.111098 754382 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.111145 754382 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00137e060 11 D0712 23:58:59.111163 754382 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:59.111192 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.111210 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 12 D0712 23:58:59.111217 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:59.111261 754382 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.111279 754382 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00137e060 13 D0712 23:58:59.111287 754382 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:59.111321 754382 task_signals.go:470] [ 958: 958] Notified of signal 23 D0712 23:58:59.111368 754382 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler D0712 23:58:59.123562 754382 task_signals.go:470] [ 958: 958] Notified of signal 23 D0712 23:58:59.123627 754382 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler I0712 23:58:59.124124 754382 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0712 23:58:59.124344 754382 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.124392 754382 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00137e060 14 D0712 23:58:59.124412 754382 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:59.124494 754382 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.124514 754382 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.124550 754382 task_signals.go:204] [ 958: 959] Signal 958, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.124568 754382 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.124577 754382 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.124583 754382 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.124603 754382 task_signals.go:204] [ 958: 960] Signal 958, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.124611 754382 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.124619 754382 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.124625 754382 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.124655 754382 task_signals.go:204] [ 958: 961] Signal 958, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.124664 754382 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.124671 754382 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.124676 754382 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.124704 754382 task_signals.go:204] [ 958: 962] Signal 958, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.124712 754382 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.126584 754382 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.126619 754382 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.126635 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.128600 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.128637 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.128782 754382 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.130394 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.132206 754382 syscalls.go:262] [ 963: 963] Allocating stack with size of 8388608 bytes D0712 23:58:59.132457 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.137301 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.137382 754382 usertrap_amd64.go:106] [ 963: 963] Map a usertrap vma at 66000 D0712 23:58:59.137550 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 1 D0712 23:58:59.137596 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.138770 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.138826 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 2 D0712 23:58:59.138849 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.139946 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.139990 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 3 D0712 23:58:59.140010 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.148009 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.148071 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 4 D0712 23:58:59.148092 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.150300 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.150345 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 5 D0712 23:58:59.150363 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.150432 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.150441 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 6 D0712 23:58:59.150449 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.150684 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.150717 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 7 D0712 23:58:59.150727 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.151437 754382 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.151472 754382 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001d6fe90 8 D0712 23:58:59.151487 754382 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.151660 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.151685 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 9 D0712 23:58:59.151696 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.151886 754382 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.151930 754382 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001d6fe90 10 D0712 23:58:59.151945 754382 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.160437 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.160483 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 11 D0712 23:58:59.160497 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.163364 754382 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.163397 754382 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001d6fe90 12 D0712 23:58:59.163419 754382 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.163474 754382 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.163486 754382 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001d6fe90 13 D0712 23:58:59.163497 754382 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.163517 754382 task_signals.go:470] [ 963: 963] Notified of signal 23 D0712 23:58:59.163632 754382 task_signals.go:220] [ 963: 963] Signal 23: delivering to handler I0712 23:58:59.172065 754382 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0712 23:58:59.172179 754382 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.172199 754382 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001d6fe90 14 D0712 23:58:59.172214 754382 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.172268 754382 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.172301 754382 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.172329 754382 task_signals.go:204] [ 963: 967] Signal 963, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.172347 754382 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.172342 754382 task_signals.go:204] [ 963: 966] Signal 963, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.172356 754382 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.172362 754382 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.172324 754382 task_signals.go:204] [ 963: 965] Signal 963, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.172404 754382 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.172414 754382 task_signals.go:204] [ 963: 964] Signal 963, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.172438 754382 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.172456 754382 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.172485 754382 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.172504 754382 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.172511 754382 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.172536 754382 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.174150 754382 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.174230 754382 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.174252 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.174314 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.174398 754382 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.175192 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.176993 754382 syscalls.go:262] [ 968: 968] Allocating stack with size of 8388608 bytes D0712 23:58:59.177111 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.178865 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.178904 754382 usertrap_amd64.go:106] [ 968: 968] Map a usertrap vma at 68000 D0712 23:58:59.179038 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 1 D0712 23:58:59.179080 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:59.179530 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.179557 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 2 D0712 23:58:59.179567 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:59.180198 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.180220 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 3 D0712 23:58:59.180231 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:59.187327 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.187374 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 4 D0712 23:58:59.187389 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:59.191050 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.191091 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 5 D0712 23:58:59.191108 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:59.191189 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.191207 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 6 D0712 23:58:59.191217 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:59.191799 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.191825 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 7 D0712 23:58:59.191836 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:59.192010 754382 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.192045 754382 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a80660 8 D0712 23:58:59.192056 754382 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:59.192273 754382 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.192286 754382 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a80660 9 D0712 23:58:59.192300 754382 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:59.192575 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.192601 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 10 D0712 23:58:59.192611 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:59.192764 754382 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.192786 754382 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a80660 11 D0712 23:58:59.192798 754382 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:59.193001 754382 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.193018 754382 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc000a80660 12 D0712 23:58:59.193027 754382 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:59.193305 754382 task_signals.go:470] [ 968: 971] Notified of signal 23 D0712 23:58:59.193339 754382 task_signals.go:179] [ 968: 971] Restarting syscall 202: interrupted by signal 23 D0712 23:58:59.193361 754382 task_signals.go:220] [ 968: 971] Signal 23: delivering to handler D0712 23:58:59.202158 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.202214 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 13 D0712 23:58:59.202233 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:59.205242 754382 task_signals.go:470] [ 968: 968] Notified of signal 23 D0712 23:58:59.205469 754382 task_signals.go:220] [ 968: 968] Signal 23: delivering to handler D0712 23:58:59.205829 754382 task_signals.go:470] [ 968: 968] Notified of signal 23 D0712 23:58:59.206012 754382 task_signals.go:220] [ 968: 968] Signal 23: delivering to handler I0712 23:58:59.215436 754382 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0712 23:58:59.215527 754382 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.215545 754382 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc000a80660 14 D0712 23:58:59.215562 754382 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:59.215635 754382 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215675 754382 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215703 754382 task_signals.go:204] [ 968: 970] Signal 968, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215773 754382 task_signals.go:204] [ 968: 969] Signal 968, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215716 754382 task_signals.go:204] [ 968: 972] Signal 968, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215780 754382 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215837 754382 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215863 754382 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.215886 754382 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215904 754382 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215911 754382 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.215721 754382 task_signals.go:204] [ 968: 971] Signal 968, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215926 754382 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215953 754382 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215960 754382 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.215974 754382 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.217716 754382 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.217754 754382 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.217771 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.218876 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.218912 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.219103 754382 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.220063 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.222074 754382 syscalls.go:262] [ 973: 973] Allocating stack with size of 8388608 bytes D0712 23:58:59.222201 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.225334 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.225383 754382 usertrap_amd64.go:106] [ 973: 973] Map a usertrap vma at 6a000 D0712 23:58:59.225531 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 1 D0712 23:58:59.225577 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:59.226132 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.226168 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 2 D0712 23:58:59.226182 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:59.227035 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.227098 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 3 D0712 23:58:59.227119 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:59.235856 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.235912 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 4 D0712 23:58:59.235930 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:59.237421 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.237458 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 5 D0712 23:58:59.237485 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:59.237847 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.237917 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 6 D0712 23:58:59.237956 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:59.238629 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.238690 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 7 D0712 23:58:59.238711 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:59.238935 754382 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.238969 754382 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc00154a7b0 8 D0712 23:58:59.238989 754382 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:59.239295 754382 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.239328 754382 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc00154a7b0 9 D0712 23:58:59.239342 754382 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:59.239511 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.239531 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 10 D0712 23:58:59.239541 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:59.248985 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.249036 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 11 D0712 23:58:59.249055 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:59.250104 754382 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.250141 754382 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc00154a7b0 12 D0712 23:58:59.250157 754382 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:59.250572 754382 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.250615 754382 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc00154a7b0 13 D0712 23:58:59.252578 754382 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:59.252684 754382 task_signals.go:470] [ 973: 973] Notified of signal 23 D0712 23:58:59.252715 754382 task_signals.go:220] [ 973: 973] Signal 23: delivering to handler I0712 23:58:59.262747 754382 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0712 23:58:59.262896 754382 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.262916 754382 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc00154a7b0 14 D0712 23:58:59.262933 754382 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:59.263002 754382 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.263039 754382 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.263054 754382 task_signals.go:204] [ 973: 974] Signal 973, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.263069 754382 task_signals.go:204] [ 973: 976] Signal 973, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.263084 754382 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.263100 754382 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.263116 754382 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.263066 754382 task_signals.go:204] [ 973: 975] Signal 973, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.263135 754382 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.263144 754382 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.263150 754382 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.263177 754382 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.263210 754382 task_signals.go:204] [ 973: 977] Signal 973, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.263226 754382 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.263233 754382 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.263246 754382 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.264777 754382 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.264831 754382 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.264848 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.264895 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.264907 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.265146 754382 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.265723 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.267599 754382 syscalls.go:262] [ 978: 978] Allocating stack with size of 8388608 bytes D0712 23:58:59.267817 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.269671 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.269710 754382 usertrap_amd64.go:106] [ 978: 978] Map a usertrap vma at 68000 D0712 23:58:59.269807 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 1 D0712 23:58:59.269847 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:59.270310 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.270334 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 2 D0712 23:58:59.270346 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:59.270945 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.270970 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 3 D0712 23:58:59.270980 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:59.277542 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.277574 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 4 D0712 23:58:59.277587 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:59.278812 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.278834 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 5 D0712 23:58:59.278844 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:59.278888 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.278894 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 6 D0712 23:58:59.278901 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:59.279066 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.279075 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 7 D0712 23:58:59.279082 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:59.279253 754382 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.279273 754382 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc00154aab0 8 D0712 23:58:59.279285 754382 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:59.279463 754382 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.279544 754382 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc00154aab0 9 D0712 23:58:59.279568 754382 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:59.279600 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.279607 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 10 D0712 23:58:59.279621 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:59.279785 754382 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.279813 754382 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc00154aab0 11 D0712 23:58:59.279827 754382 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:59.279878 754382 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.279896 754382 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc00154aab0 12 D0712 23:58:59.279904 754382 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:59.279985 754382 task_signals.go:470] [ 978: 981] Notified of signal 23 D0712 23:58:59.280051 754382 task_signals.go:179] [ 978: 981] Restarting syscall 202: interrupted by signal 23 D0712 23:58:59.280074 754382 task_signals.go:220] [ 978: 981] Signal 23: delivering to handler D0712 23:58:59.280657 754382 task_signals.go:470] [ 978: 978] Notified of signal 23 D0712 23:58:59.280867 754382 task_signals.go:220] [ 978: 978] Signal 23: delivering to handler D0712 23:58:59.289423 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.289455 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 13 D0712 23:58:59.289467 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:59.291257 754382 task_signals.go:470] [ 978: 978] Notified of signal 23 D0712 23:58:59.292027 754382 task_signals.go:220] [ 978: 978] Signal 23: delivering to handler I0712 23:58:59.301025 754382 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0712 23:58:59.301201 754382 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.301285 754382 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc00154aab0 14 D0712 23:58:59.301311 754382 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:59.301387 754382 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.301431 754382 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.301464 754382 task_signals.go:204] [ 978: 980] Signal 978, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.301500 754382 task_signals.go:204] [ 978: 979] Signal 978, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.301507 754382 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.301474 754382 task_signals.go:204] [ 978: 982] Signal 978, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.301527 754382 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.301474 754382 task_signals.go:204] [ 978: 981] Signal 978, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.301548 754382 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.301574 754382 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.301594 754382 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.301608 754382 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.301615 754382 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.301629 754382 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.301677 754382 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.301710 754382 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.303424 754382 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.303487 754382 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.303507 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.303546 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.303574 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.303717 754382 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.304398 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.306284 754382 syscalls.go:262] [ 983: 983] Allocating stack with size of 8388608 bytes D0712 23:58:59.306414 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.309443 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.309513 754382 usertrap_amd64.go:106] [ 983: 983] Map a usertrap vma at 64000 D0712 23:58:59.309638 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 1 D0712 23:58:59.309671 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:59.310103 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.310131 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 2 D0712 23:58:59.310143 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:59.310900 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.310937 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 3 D0712 23:58:59.310954 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:59.317990 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.318022 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 4 D0712 23:58:59.318034 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:59.319192 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.319220 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 5 D0712 23:58:59.319232 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:59.319291 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.319300 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 6 D0712 23:58:59.319310 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:59.319778 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.319806 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 7 D0712 23:58:59.319817 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:59.320014 754382 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.320061 754382 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc0004e01b0 8 D0712 23:58:59.320082 754382 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:59.320374 754382 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.320394 754382 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc0004e01b0 9 D0712 23:58:59.320404 754382 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:59.320458 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.320474 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 10 D0712 23:58:59.320485 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:59.328051 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.328079 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 11 D0712 23:58:59.328091 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:59.331161 754382 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.331230 754382 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc0004e01b0 12 D0712 23:58:59.331253 754382 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:59.331294 754382 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.331326 754382 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc0004e01b0 13 D0712 23:58:59.331340 754382 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:59.331383 754382 task_signals.go:470] [ 983: 983] Notified of signal 23 D0712 23:58:59.331556 754382 task_signals.go:220] [ 983: 983] Signal 23: delivering to handler D0712 23:58:59.340427 754382 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.340490 754382 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc0004e01b0 14 D0712 23:58:59.340508 754382 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:59.340575 754382 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.340629 754382 task_signals.go:204] [ 983: 984] Signal 983, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.340650 754382 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.340689 754382 task_signals.go:204] [ 983: 987] Signal 983, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.340714 754382 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.340725 754382 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.340733 754382 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.340750 754382 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.340773 754382 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.340780 754382 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.340797 754382 task_signals.go:204] [ 983: 985] Signal 983, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.340811 754382 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.340825 754382 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.340844 754382 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.340865 754382 task_signals.go:204] [ 983: 986] Signal 983, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.340888 754382 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.342373 754382 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.342401 754382 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.342416 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.342472 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.342480 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.344745 754382 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.345609 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.347371 754382 syscalls.go:262] [ 988: 988] Allocating stack with size of 8388608 bytes D0712 23:58:59.347516 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.349080 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.349137 754382 usertrap_amd64.go:106] [ 988: 988] Map a usertrap vma at 65000 D0712 23:58:59.349263 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 1 D0712 23:58:59.349300 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:59.349848 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.349877 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 2 D0712 23:58:59.349888 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:59.350645 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.350673 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 3 D0712 23:58:59.350686 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:59.358267 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.358326 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 4 D0712 23:58:59.358346 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:59.360165 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.360232 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 5 D0712 23:58:59.360261 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:59.360326 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.360338 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 6 D0712 23:58:59.360347 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:59.360560 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.360581 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 7 D0712 23:58:59.360589 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:59.360826 754382 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.360850 754382 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc00154b500 8 D0712 23:58:59.360861 754382 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:59.361072 754382 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.361094 754382 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc00154b500 9 D0712 23:58:59.361103 754382 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:59.361303 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.361340 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 10 D0712 23:58:59.361355 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:59.361371 754382 usertrap_amd64.go:212] [ 988: 991] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.361378 754382 usertrap_amd64.go:122] [ 988: 991] Allocate a new trap: 0xc00154b500 11 D0712 23:58:59.361388 754382 usertrap_amd64.go:225] [ 988: 991] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:59.370266 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.370335 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 12 D0712 23:58:59.370357 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:59.373309 754382 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.373360 754382 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc00154b500 13 D0712 23:58:59.373380 754382 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:59.373456 754382 usertrap_amd64.go:212] [ 988: 989] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.373484 754382 usertrap_amd64.go:122] [ 988: 989] Allocate a new trap: 0xc00154b500 14 D0712 23:58:59.373493 754382 usertrap_amd64.go:225] [ 988: 989] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:59.373597 754382 task_signals.go:470] [ 988: 988] Notified of signal 23 D0712 23:58:59.373738 754382 task_signals.go:220] [ 988: 988] Signal 23: delivering to handler D0712 23:58:59.382850 754382 usertrap_amd64.go:212] [ 988: 988] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.382911 754382 usertrap_amd64.go:122] [ 988: 988] Allocate a new trap: 0xc00154b500 15 D0712 23:58:59.382935 754382 usertrap_amd64.go:225] [ 988: 988] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 23:58:59.383029 754382 task_exit.go:204] [ 988: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.383094 754382 task_exit.go:204] [ 988: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.383148 754382 task_signals.go:204] [ 988: 992] Signal 988, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.383204 754382 task_exit.go:204] [ 988: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.383232 754382 task_exit.go:204] [ 988: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.383241 754382 task_exit.go:204] [ 988: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.383272 754382 task_signals.go:204] [ 988: 990] Signal 988, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.383285 754382 task_exit.go:204] [ 988: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.383295 754382 task_exit.go:204] [ 988: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.383301 754382 task_exit.go:204] [ 988: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.383320 754382 task_signals.go:204] [ 988: 991] Signal 988, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.383333 754382 task_exit.go:204] [ 988: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.383341 754382 task_exit.go:204] [ 988: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.383349 754382 task_exit.go:204] [ 988: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.383366 754382 task_signals.go:204] [ 988: 989] Signal 988, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.383378 754382 task_exit.go:204] [ 988: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.385305 754382 task_exit.go:204] [ 988: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.385350 754382 task_exit.go:204] [ 988: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.385370 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.385406 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.385426 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.385572 754382 task_exit.go:204] [ 988: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.386334 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.388165 754382 syscalls.go:262] [ 993: 993] Allocating stack with size of 8388608 bytes D0712 23:58:59.388341 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.389582 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.389668 754382 usertrap_amd64.go:106] [ 993: 993] Map a usertrap vma at 68000 D0712 23:58:59.389801 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 1 D0712 23:58:59.389853 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:59.390631 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.390663 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 2 D0712 23:58:59.390681 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:59.391539 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.391569 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 3 D0712 23:58:59.391581 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:59.400162 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.400202 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 4 D0712 23:58:59.400217 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:59.401466 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.401498 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 5 D0712 23:58:59.401509 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:59.401565 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.401575 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 6 D0712 23:58:59.401583 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:59.401955 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.401984 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 7 D0712 23:58:59.401995 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:59.402200 754382 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.402220 754382 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc00154b620 8 D0712 23:58:59.402230 754382 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:59.402311 754382 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.402332 754382 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc00154b620 9 D0712 23:58:59.402342 754382 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:59.402561 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.402603 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 10 D0712 23:58:59.402617 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:59.411515 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.411561 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 11 D0712 23:58:59.411576 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:59.414537 754382 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.414575 754382 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc00154b620 12 D0712 23:58:59.414589 754382 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:59.414643 754382 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.414649 754382 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc00154b620 13 D0712 23:58:59.414659 754382 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:59.414691 754382 task_signals.go:470] [ 993: 993] Notified of signal 23 D0712 23:58:59.414833 754382 task_signals.go:220] [ 993: 993] Signal 23: delivering to handler D0712 23:58:59.424497 754382 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.424546 754382 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc00154b620 14 D0712 23:58:59.424565 754382 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:59.424631 754382 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.424659 754382 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.424691 754382 task_signals.go:204] [ 993: 994] Signal 993, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.424722 754382 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.424733 754382 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.424708 754382 task_signals.go:204] [ 993: 996] Signal 993, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.424740 754382 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.424774 754382 task_signals.go:204] [ 993: 997] Signal 993, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.424789 754382 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.424786 754382 task_signals.go:204] [ 993: 995] Signal 993, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.424810 754382 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.424818 754382 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.424833 754382 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.424857 754382 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.424864 754382 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.424876 754382 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.426784 754382 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.426820 754382 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.426841 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.426875 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.426929 754382 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitZombie to TaskExitDead I0712 23:58:59.427163 754382 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0712 23:58:59.427894 754382 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.429443 754382 syscalls.go:262] [ 998: 998] Allocating stack with size of 8388608 bytes D0712 23:58:59.429657 754382 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.433177 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.433289 754382 usertrap_amd64.go:106] [ 998: 998] Map a usertrap vma at 65000 D0712 23:58:59.433490 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 1 D0712 23:58:59.433541 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:59.434162 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.434199 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 2 D0712 23:58:59.434214 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:59.434985 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.435016 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 3 D0712 23:58:59.435028 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:59.443682 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.443748 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 4 D0712 23:58:59.443770 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:59.445360 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.445390 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 5 D0712 23:58:59.445407 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:59.445478 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.445500 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 6 D0712 23:58:59.445510 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:59.446292 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.446317 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 7 D0712 23:58:59.446329 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:59.446568 754382 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.446607 754382 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0004e0360 8 D0712 23:58:59.446622 754382 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:59.446909 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.446943 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 9 D0712 23:58:59.446960 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:59.446976 754382 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.446986 754382 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0004e0360 10 D0712 23:58:59.446995 754382 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:59.456185 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.456242 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 11 D0712 23:58:59.456261 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:59.458934 754382 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.458981 754382 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0004e0360 12 D0712 23:58:59.458998 754382 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:59.459089 754382 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.459095 754382 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0004e0360 13 D0712 23:58:59.459101 754382 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:59.459120 754382 task_signals.go:470] [ 998: 998] Notified of signal 23 D0712 23:58:59.459173 754382 task_signals.go:220] [ 998: 998] Signal 23: delivering to handler I0712 23:58:59.467255 754382 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0712 23:58:59.467372 754382 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.467385 754382 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0004e0360 14 D0712 23:58:59.467397 754382 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:59.467554 754382 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.467586 754382 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.467622 754382 task_signals.go:204] [ 998: 1001] Signal 998, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.467635 754382 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.467609 754382 task_signals.go:204] [ 998: 1000] Signal 998, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.467640 754382 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.467637 754382 task_signals.go:204] [ 998: 1002] Signal 998, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.467658 754382 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.467679 754382 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.467698 754382 task_signals.go:204] [ 998: 999] Signal 998, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.467744 754382 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.467763 754382 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.467782 754382 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.467793 754382 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.467801 754382 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.467825 754382 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.469422 754382 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.469447 754382 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.469471 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.469500 754382 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.469519 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.469785 754382 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.470559 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.472618 754382 syscalls.go:262] [ 1003: 1003] Allocating stack with size of 8388608 bytes D0712 23:58:59.472745 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.473998 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.474039 754382 usertrap_amd64.go:106] [ 1003: 1003] Map a usertrap vma at 62000 D0712 23:58:59.474253 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 1 D0712 23:58:59.474289 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:59.474729 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.474768 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 2 D0712 23:58:59.474786 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:59.475693 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.475724 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 3 D0712 23:58:59.475738 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:59.484041 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.484076 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 4 D0712 23:58:59.484093 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:59.485829 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.485854 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 5 D0712 23:58:59.485866 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:59.485926 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.485931 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 6 D0712 23:58:59.485937 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:59.486286 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.486300 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 7 D0712 23:58:59.486309 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:59.486454 754382 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.486484 754382 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc00154bc50 8 D0712 23:58:59.486497 754382 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:59.486681 754382 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.486709 754382 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc00154bc50 9 D0712 23:58:59.486722 754382 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:59.486896 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.486929 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 10 D0712 23:58:59.486941 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:59.495170 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.495198 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 11 D0712 23:58:59.495213 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:59.498036 754382 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.498063 754382 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc00154bc50 12 D0712 23:58:59.498074 754382 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:59.498126 754382 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.498135 754382 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc00154bc50 13 D0712 23:58:59.498145 754382 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:59.498163 754382 task_signals.go:470] [ 1003: 1003] Notified of signal 23 D0712 23:58:59.498291 754382 task_signals.go:220] [ 1003: 1003] Signal 23: delivering to handler I0712 23:58:59.506996 754382 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0712 23:58:59.507083 754382 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.507112 754382 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc00154bc50 14 D0712 23:58:59.507125 754382 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:59.507197 754382 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.507224 754382 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.507252 754382 task_signals.go:204] [ 1003: 1006] Signal 1003, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.507281 754382 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.507278 754382 task_signals.go:204] [ 1003: 1004] Signal 1003, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.507265 754382 task_signals.go:204] [ 1003: 1005] Signal 1003, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.507290 754382 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.507313 754382 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.507346 754382 task_signals.go:204] [ 1003: 1007] Signal 1003, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.507357 754382 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.507373 754382 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.507398 754382 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.507422 754382 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.507453 754382 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.507460 754382 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.507477 754382 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.509108 754382 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.509152 754382 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.509170 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.509268 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.509327 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.509428 754382 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.510221 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.511500 754382 syscalls.go:262] [ 1008: 1008] Allocating stack with size of 8388608 bytes D0712 23:58:59.511597 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.513743 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.513789 754382 usertrap_amd64.go:106] [ 1008: 1008] Map a usertrap vma at 62000 D0712 23:58:59.514074 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 1 D0712 23:58:59.514106 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:59.514415 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.514450 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 2 D0712 23:58:59.514461 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:59.515160 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.515199 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 3 D0712 23:58:59.515211 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:59.522377 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.522407 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 4 D0712 23:58:59.522418 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:59.523818 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.523847 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 5 D0712 23:58:59.523861 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:59.523911 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.523917 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 6 D0712 23:58:59.523922 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:59.524119 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.524137 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 7 D0712 23:58:59.524144 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:59.524298 754382 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.524322 754382 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc0004e0c30 8 D0712 23:58:59.524332 754382 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:59.524534 754382 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.524559 754382 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc0004e0c30 9 D0712 23:58:59.524572 754382 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:59.524694 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.524731 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 10 D0712 23:58:59.524748 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:59.533045 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.533084 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 11 D0712 23:58:59.533099 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:59.536343 754382 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.536382 754382 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc0004e0c30 12 D0712 23:58:59.536398 754382 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:59.536525 754382 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.536544 754382 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc0004e0c30 13 D0712 23:58:59.536553 754382 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:59.536692 754382 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0712 23:58:59.536875 754382 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0712 23:58:59.545628 754382 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.545667 754382 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc0004e0c30 14 D0712 23:58:59.545680 754382 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:59.545735 754382 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.545761 754382 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.545792 754382 task_signals.go:204] [ 1008: 1011] Signal 1008, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.545816 754382 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.545813 754382 task_signals.go:204] [ 1008: 1012] Signal 1008, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.545826 754382 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.545786 754382 task_signals.go:204] [ 1008: 1010] Signal 1008, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.545832 754382 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.545789 754382 task_signals.go:204] [ 1008: 1009] Signal 1008, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.545854 754382 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.545873 754382 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.545880 754382 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.545890 754382 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.545895 754382 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.545899 754382 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.545906 754382 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.547370 754382 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.547403 754382 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.547420 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.547516 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.547558 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.547646 754382 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.548334 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.550317 754382 syscalls.go:262] [ 1013: 1013] Allocating stack with size of 8388608 bytes D0712 23:58:59.550561 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.552013 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.552057 754382 usertrap_amd64.go:106] [ 1013: 1013] Map a usertrap vma at 66000 D0712 23:58:59.552155 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 1 D0712 23:58:59.552180 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.552750 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.552798 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 2 D0712 23:58:59.552821 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.553755 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.553798 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 3 D0712 23:58:59.553815 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.562458 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.562505 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 4 D0712 23:58:59.562522 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.563848 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.563909 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 5 D0712 23:58:59.563926 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.563993 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.564006 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 6 D0712 23:58:59.564014 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.564468 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.564491 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 7 D0712 23:58:59.564499 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.564721 754382 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.564749 754382 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001204ff0 8 D0712 23:58:59.564765 754382 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.564841 754382 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.564858 754382 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001204ff0 9 D0712 23:58:59.564869 754382 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.565324 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.565360 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 10 D0712 23:58:59.565372 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.574390 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.574434 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 11 D0712 23:58:59.574447 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.577119 754382 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.577162 754382 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001204ff0 12 D0712 23:58:59.577180 754382 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.577210 754382 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.577228 754382 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc001204ff0 13 D0712 23:58:59.577239 754382 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.577299 754382 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0712 23:58:59.577368 754382 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0712 23:58:59.586011 754382 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.586056 754382 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc001204ff0 14 D0712 23:58:59.586070 754382 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.586139 754382 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.586163 754382 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.586188 754382 task_signals.go:204] [ 1013: 1014] Signal 1013, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.586199 754382 task_signals.go:204] [ 1013: 1016] Signal 1013, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.586223 754382 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.586233 754382 task_signals.go:204] [ 1013: 1015] Signal 1013, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.586247 754382 task_signals.go:204] [ 1013: 1017] Signal 1013, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.586256 754382 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.586262 754382 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.586273 754382 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.586282 754382 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.586288 754382 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.586303 754382 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.586311 754382 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.586317 754382 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.586335 754382 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.587798 754382 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.587837 754382 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.587851 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.587887 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.587896 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.588005 754382 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.588780 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.590801 754382 syscalls.go:262] [ 1018: 1018] Allocating stack with size of 8388608 bytes D0712 23:58:59.591021 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.596680 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.597463 754382 usertrap_amd64.go:106] [ 1018: 1018] Map a usertrap vma at 62000 D0712 23:58:59.597724 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 1 D0712 23:58:59.597850 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:59.598795 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.598823 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 2 D0712 23:58:59.598872 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:59.599599 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.599625 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 3 D0712 23:58:59.599633 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:59.606838 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.606875 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 4 D0712 23:58:59.606890 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:59.607954 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.607976 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 5 D0712 23:58:59.607984 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:59.608080 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.608094 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 6 D0712 23:58:59.608100 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:59.608339 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.608356 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 7 D0712 23:58:59.608379 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:59.609043 754382 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.609140 754382 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00137f110 8 D0712 23:58:59.609166 754382 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:59.609532 754382 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.609557 754382 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00137f110 9 D0712 23:58:59.609643 754382 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:59.609946 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.609978 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 10 D0712 23:58:59.609995 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:59.617995 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.618029 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 11 D0712 23:58:59.618042 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:59.620869 754382 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.620895 754382 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00137f110 12 D0712 23:58:59.620907 754382 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:59.620967 754382 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.621031 754382 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc00137f110 13 D0712 23:58:59.621109 754382 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:59.621148 754382 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0712 23:58:59.621331 754382 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0712 23:58:59.629617 754382 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.629654 754382 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc00137f110 14 D0712 23:58:59.629687 754382 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:59.629765 754382 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.629808 754382 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.629973 754382 task_signals.go:204] [ 1018: 1020] Signal 1018, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.630016 754382 task_signals.go:204] [ 1018: 1019] Signal 1018, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.630077 754382 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.630097 754382 task_signals.go:204] [ 1018: 1022] Signal 1018, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.630122 754382 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.630203 754382 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.630139 754382 task_signals.go:204] [ 1018: 1021] Signal 1018, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.630262 754382 task_signals.go:204] [ 1018: 1023] Signal 1018, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.630297 754382 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.630361 754382 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.630376 754382 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.630426 754382 task_exit.go:204] [ 1018: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.630531 754382 task_exit.go:204] [ 1018: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.630545 754382 task_exit.go:204] [ 1018: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.630559 754382 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.630567 754382 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.630606 754382 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.630635 754382 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.632577 754382 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.632655 754382 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.632786 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.633020 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.633052 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.633150 754382 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.633286 754382 task_signals.go:470] [ 6: 20] Notified of signal 23 D0712 23:58:59.633390 754382 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0712 23:58:59.634849 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.637354 754382 syscalls.go:262] [ 1024: 1024] Allocating stack with size of 8388608 bytes D0712 23:58:59.637566 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.638616 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.638660 754382 usertrap_amd64.go:106] [ 1024: 1024] Map a usertrap vma at 68000 D0712 23:58:59.638757 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 1 D0712 23:58:59.638795 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:59.639032 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.639055 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 2 D0712 23:58:59.639065 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:59.639639 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.639669 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 3 D0712 23:58:59.639716 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:59.646881 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.646945 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 4 D0712 23:58:59.646966 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:59.648183 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.648215 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 5 D0712 23:58:59.648241 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:59.648306 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.648322 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 6 D0712 23:58:59.648332 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:59.648610 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.648638 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 7 D0712 23:58:59.648648 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:59.648868 754382 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.648895 754382 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000721560 8 D0712 23:58:59.648905 754382 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:59.649225 754382 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.649270 754382 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000721560 9 D0712 23:58:59.649287 754382 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:59.649401 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.649430 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 10 D0712 23:58:59.649442 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:59.649637 754382 usertrap_amd64.go:212] [ 1024: 1027] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.649691 754382 usertrap_amd64.go:122] [ 1024: 1027] Allocate a new trap: 0xc000721560 11 D0712 23:58:59.649710 754382 usertrap_amd64.go:225] [ 1024: 1027] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:59.658573 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.658606 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 12 D0712 23:58:59.658619 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:59.661491 754382 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.661542 754382 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000721560 13 D0712 23:58:59.661561 754382 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:59.661588 754382 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.661594 754382 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000721560 14 D0712 23:58:59.661602 754382 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:59.661624 754382 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0712 23:58:59.661726 754382 task_signals.go:220] [ 1024: 1024] Signal 23: delivering to handler D0712 23:58:59.670464 754382 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.670520 754382 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000721560 15 D0712 23:58:59.670536 754382 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 23:58:59.670625 754382 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.670654 754382 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.670686 754382 task_signals.go:204] [ 1024: 1027] Signal 1024, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.670711 754382 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.670718 754382 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.670722 754382 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.670718 754382 task_signals.go:204] [ 1024: 1025] Signal 1024, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.670754 754382 task_signals.go:204] [ 1024: 1028] Signal 1024, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.670754 754382 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.670809 754382 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.670848 754382 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.670854 754382 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.670725 754382 task_signals.go:204] [ 1024: 1026] Signal 1024, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.670887 754382 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.670907 754382 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.670922 754382 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.672697 754382 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.672742 754382 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.672779 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.672818 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.672832 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.672916 754382 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.673018 754382 task_signals.go:470] [ 6: 20] Notified of signal 23 D0712 23:58:59.673080 754382 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0712 23:58:59.674286 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.676009 754382 syscalls.go:262] [ 1029: 1029] Allocating stack with size of 8388608 bytes D0712 23:58:59.676162 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.677506 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.677556 754382 usertrap_amd64.go:106] [ 1029: 1029] Map a usertrap vma at 64000 D0712 23:58:59.677749 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 1 D0712 23:58:59.677787 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:59.678214 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.678265 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 2 D0712 23:58:59.678281 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:59.679144 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.679184 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 3 D0712 23:58:59.679205 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:59.685587 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.685614 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 4 D0712 23:58:59.685625 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:59.686728 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.686753 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 5 D0712 23:58:59.686761 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:59.686821 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.686840 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 6 D0712 23:58:59.686850 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:59.687429 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.687454 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 7 D0712 23:58:59.687467 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:59.687679 754382 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.687725 754382 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0007215f0 8 D0712 23:58:59.687742 754382 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:59.688156 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.688203 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 9 D0712 23:58:59.688216 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:59.688238 754382 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.688246 754382 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0007215f0 10 D0712 23:58:59.688258 754382 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:59.688901 754382 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.688928 754382 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0007215f0 11 D0712 23:58:59.688956 754382 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:59.689083 754382 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.689099 754382 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0007215f0 12 D0712 23:58:59.689108 754382 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:59.689123 754382 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0712 23:58:59.689215 754382 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0712 23:58:59.695977 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.696023 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 13 D0712 23:58:59.696036 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:59.699323 754382 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0712 23:58:59.699417 754382 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0712 23:58:59.707883 754382 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.707915 754382 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0007215f0 14 D0712 23:58:59.707929 754382 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:59.708011 754382 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.708037 754382 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.708061 754382 task_signals.go:204] [ 1029: 1032] Signal 1029, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.708058 754382 task_signals.go:204] [ 1029: 1031] Signal 1029, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.708073 754382 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.708092 754382 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.708114 754382 task_signals.go:204] [ 1029: 1033] Signal 1029, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.708179 754382 task_signals.go:204] [ 1029: 1030] Signal 1029, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.708205 754382 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.708234 754382 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.708243 754382 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.708259 754382 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.708279 754382 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.708293 754382 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.708346 754382 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.708367 754382 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.710104 754382 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.710128 754382 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.710141 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.710176 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.710196 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.710483 754382 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.710654 754382 task_signals.go:470] [ 6: 20] Notified of signal 23 D0712 23:58:59.710799 754382 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0712 23:58:59.711961 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.713808 754382 syscalls.go:262] [ 1034: 1034] Allocating stack with size of 8388608 bytes D0712 23:58:59.714227 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.715439 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.715508 754382 usertrap_amd64.go:106] [ 1034: 1034] Map a usertrap vma at 69000 D0712 23:58:59.715634 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 1 D0712 23:58:59.715671 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:59.716724 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.716755 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 2 D0712 23:58:59.716770 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:59.717582 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.717606 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 3 D0712 23:58:59.717618 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:59.724586 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.724614 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 4 D0712 23:58:59.724625 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:59.725918 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.725941 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 5 D0712 23:58:59.725949 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:59.726001 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.726013 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 6 D0712 23:58:59.726019 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:59.726227 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.726249 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 7 D0712 23:58:59.726255 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:59.726382 754382 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.726411 754382 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019e9200 8 D0712 23:58:59.726424 754382 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:59.726571 754382 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.726595 754382 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019e9200 9 D0712 23:58:59.726602 754382 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:59.726718 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.726741 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 10 D0712 23:58:59.726756 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:59.734678 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.734703 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 11 D0712 23:58:59.734711 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:59.737255 754382 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.737288 754382 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019e9200 12 D0712 23:58:59.737301 754382 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:59.737365 754382 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.737382 754382 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019e9200 13 D0712 23:58:59.737394 754382 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:59.737446 754382 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0712 23:58:59.737522 754382 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0712 23:58:59.745031 754382 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.745057 754382 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019e9200 14 D0712 23:58:59.745066 754382 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:59.745102 754382 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.745127 754382 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.745155 754382 task_signals.go:204] [ 1034: 1035] Signal 1034, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.745168 754382 task_signals.go:204] [ 1034: 1038] Signal 1034, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.745189 754382 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.745203 754382 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.745202 754382 task_signals.go:204] [ 1034: 1036] Signal 1034, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.745209 754382 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.745233 754382 task_signals.go:204] [ 1034: 1037] Signal 1034, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.745252 754382 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.745261 754382 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.745267 754382 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.745277 754382 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.745292 754382 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.745303 754382 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.745309 754382 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.746759 754382 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.746793 754382 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.746805 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.746891 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.746910 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.747031 754382 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.747718 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.749318 754382 syscalls.go:262] [ 1039: 1039] Allocating stack with size of 8388608 bytes D0712 23:58:59.749528 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.750765 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.750787 754382 usertrap_amd64.go:106] [ 1039: 1039] Map a usertrap vma at 63000 D0712 23:58:59.750895 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 1 D0712 23:58:59.750929 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:59.751260 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.751277 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 2 D0712 23:58:59.751283 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:59.752350 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.752373 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 3 D0712 23:58:59.752382 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:59.759480 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.759504 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 4 D0712 23:58:59.759512 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:59.760473 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.760494 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 5 D0712 23:58:59.760501 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:59.760536 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.760541 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 6 D0712 23:58:59.760546 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:59.760744 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.760767 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 7 D0712 23:58:59.760783 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:59.761183 754382 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.761215 754382 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00154bdd0 8 D0712 23:58:59.761230 754382 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:59.761423 754382 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.761459 754382 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00154bdd0 9 D0712 23:58:59.761472 754382 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:59.761573 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.761607 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 10 D0712 23:58:59.761617 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:59.768878 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.768919 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 11 D0712 23:58:59.768931 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:59.771815 754382 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.771844 754382 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00154bdd0 12 D0712 23:58:59.771858 754382 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:59.771929 754382 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.771950 754382 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00154bdd0 13 D0712 23:58:59.771960 754382 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:59.772044 754382 task_signals.go:470] [ 1039: 1039] Notified of signal 23 D0712 23:58:59.772161 754382 task_signals.go:220] [ 1039: 1039] Signal 23: delivering to handler D0712 23:58:59.780138 754382 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.780189 754382 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00154bdd0 14 D0712 23:58:59.780210 754382 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:59.780294 754382 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.780329 754382 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.780345 754382 task_signals.go:204] [ 1039: 1041] Signal 1039, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.780369 754382 task_signals.go:204] [ 1039: 1043] Signal 1039, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.780373 754382 task_signals.go:204] [ 1039: 1042] Signal 1039, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.780380 754382 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.780396 754382 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.780425 754382 task_signals.go:204] [ 1039: 1040] Signal 1039, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.780450 754382 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.780460 754382 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.780479 754382 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.780497 754382 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.780515 754382 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.780528 754382 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.780543 754382 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.780557 754382 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.782134 754382 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.782174 754382 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.782199 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.782231 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.782259 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.782397 754382 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.783081 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.784684 754382 syscalls.go:262] [ 1044: 1044] Allocating stack with size of 8388608 bytes D0712 23:58:59.784798 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.786608 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.786645 754382 usertrap_amd64.go:106] [ 1044: 1044] Map a usertrap vma at 66000 D0712 23:58:59.786769 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 1 D0712 23:58:59.786808 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.787065 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.787168 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 2 D0712 23:58:59.787188 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.787847 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.787874 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 3 D0712 23:58:59.787886 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.795997 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.796025 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 4 D0712 23:58:59.796037 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.797421 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.797478 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 5 D0712 23:58:59.797495 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.797558 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.797573 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 6 D0712 23:58:59.797579 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.797752 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.797783 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 7 D0712 23:58:59.797790 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.797987 754382 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.798022 754382 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc00154bf20 8 D0712 23:58:59.798041 754382 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.798441 754382 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.798490 754382 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc00154bf20 9 D0712 23:58:59.798502 754382 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.798537 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.798566 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 10 D0712 23:58:59.798580 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.806988 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.807023 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 11 D0712 23:58:59.807037 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.810961 754382 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.810997 754382 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc00154bf20 12 D0712 23:58:59.811011 754382 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.811061 754382 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.811075 754382 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc00154bf20 13 D0712 23:58:59.811091 754382 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.811110 754382 task_signals.go:470] [ 1044: 1044] Notified of signal 23 D0712 23:58:59.811226 754382 task_signals.go:220] [ 1044: 1044] Signal 23: delivering to handler I0712 23:58:59.819297 754382 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0712 23:58:59.819432 754382 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.819454 754382 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc00154bf20 14 D0712 23:58:59.819469 754382 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.819544 754382 task_exit.go:204] [ 1044: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.819572 754382 task_exit.go:204] [ 1044: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.819587 754382 task_signals.go:204] [ 1044: 1045] Signal 1044, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.819598 754382 task_signals.go:204] [ 1044: 1047] Signal 1044, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.819614 754382 task_signals.go:204] [ 1044: 1048] Signal 1044, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.819624 754382 task_exit.go:204] [ 1044: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.819637 754382 task_signals.go:204] [ 1044: 1046] Signal 1044, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.819664 754382 task_exit.go:204] [ 1044: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.819680 754382 task_exit.go:204] [ 1044: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.819695 754382 task_exit.go:204] [ 1044: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.819705 754382 task_exit.go:204] [ 1044: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.819712 754382 task_exit.go:204] [ 1044: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.819720 754382 task_exit.go:204] [ 1044: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.819730 754382 task_exit.go:204] [ 1044: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.819734 754382 task_exit.go:204] [ 1044: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.819766 754382 task_exit.go:204] [ 1044: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.821489 754382 task_exit.go:204] [ 1044: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.821537 754382 task_exit.go:204] [ 1044: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.821554 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.821590 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.821601 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.821844 754382 task_exit.go:204] [ 1044: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.822880 754382 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.824525 754382 syscalls.go:262] [ 1049: 1049] Allocating stack with size of 8388608 bytes D0712 23:58:59.824648 754382 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.825959 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.826006 754382 usertrap_amd64.go:106] [ 1049: 1049] Map a usertrap vma at 63000 D0712 23:58:59.826106 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 1 D0712 23:58:59.826143 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:59.826623 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.826655 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 2 D0712 23:58:59.826670 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:59.827511 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.827539 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 3 D0712 23:58:59.827551 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:59.834291 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.834327 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 4 D0712 23:58:59.834345 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:59.835438 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.835458 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 5 D0712 23:58:59.835473 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:59.835534 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.835555 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 6 D0712 23:58:59.835563 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:59.836024 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.836049 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 7 D0712 23:58:59.836059 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:59.836418 754382 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.836446 754382 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc0004e18f0 8 D0712 23:58:59.836461 754382 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:59.836640 754382 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.836678 754382 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc0004e18f0 9 D0712 23:58:59.836697 754382 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:59.836819 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.836851 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 10 D0712 23:58:59.836865 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:59.837064 754382 usertrap_amd64.go:212] [ 1049: 1052] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.837096 754382 usertrap_amd64.go:122] [ 1049: 1052] Allocate a new trap: 0xc0004e18f0 11 D0712 23:58:59.837109 754382 usertrap_amd64.go:225] [ 1049: 1052] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:59.844699 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.844727 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 12 D0712 23:58:59.844736 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:59.847568 754382 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.847623 754382 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc0004e18f0 13 D0712 23:58:59.847640 754382 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:59.847672 754382 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.847691 754382 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc0004e18f0 14 D0712 23:58:59.847703 754382 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:59.847767 754382 task_signals.go:470] [ 1049: 1049] Notified of signal 23 D0712 23:58:59.847818 754382 task_signals.go:220] [ 1049: 1049] Signal 23: delivering to handler I0712 23:58:59.856338 754382 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0712 23:58:59.856433 754382 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.856447 754382 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc0004e18f0 15 D0712 23:58:59.856482 754382 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 23:58:59.856526 754382 task_exit.go:204] [ 1049: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.856550 754382 task_exit.go:204] [ 1049: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.856576 754382 task_signals.go:204] [ 1049: 1051] Signal 1049, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.856602 754382 task_exit.go:204] [ 1049: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.856578 754382 task_signals.go:204] [ 1049: 1052] Signal 1049, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.856625 754382 task_exit.go:204] [ 1049: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.856646 754382 task_exit.go:204] [ 1049: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.856664 754382 task_signals.go:204] [ 1049: 1050] Signal 1049, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.856714 754382 task_exit.go:204] [ 1049: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.856740 754382 task_signals.go:204] [ 1049: 1053] Signal 1049, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.856757 754382 task_exit.go:204] [ 1049: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.856766 754382 task_exit.go:204] [ 1049: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.856778 754382 task_exit.go:204] [ 1049: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.856789 754382 task_exit.go:204] [ 1049: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.856797 754382 task_exit.go:204] [ 1049: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.856808 754382 task_exit.go:204] [ 1049: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.858262 754382 task_exit.go:204] [ 1049: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.858288 754382 task_exit.go:204] [ 1049: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.858313 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.858340 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.858360 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.858410 754382 task_exit.go:204] [ 1049: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.858973 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.860376 754382 syscalls.go:262] [ 1054: 1054] Allocating stack with size of 8388608 bytes D0712 23:58:59.860491 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.864150 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.864193 754382 usertrap_amd64.go:106] [ 1054: 1054] Map a usertrap vma at 66000 D0712 23:58:59.864270 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 1 D0712 23:58:59.864288 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.864562 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.864576 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 2 D0712 23:58:59.864583 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.865081 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.865160 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 3 D0712 23:58:59.865189 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.872045 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.872112 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 4 D0712 23:58:59.872132 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.873315 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.873356 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 5 D0712 23:58:59.873375 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.873453 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.873471 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 6 D0712 23:58:59.873479 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.874098 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.874130 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 7 D0712 23:58:59.874141 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.874449 754382 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.874472 754382 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000721bc0 8 D0712 23:58:59.874481 754382 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.874828 754382 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.874962 754382 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000721bc0 9 D0712 23:58:59.875051 754382 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.875074 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.875192 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 10 D0712 23:58:59.875226 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.883247 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.883298 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 11 D0712 23:58:59.883313 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.885768 754382 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.885811 754382 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000721bc0 12 D0712 23:58:59.885827 754382 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.885908 754382 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.885916 754382 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000721bc0 13 D0712 23:58:59.885922 754382 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.885960 754382 task_signals.go:470] [ 1054: 1054] Notified of signal 23 D0712 23:58:59.886114 754382 task_signals.go:220] [ 1054: 1054] Signal 23: delivering to handler I0712 23:58:59.894662 754382 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0712 23:58:59.894812 754382 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.894846 754382 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000721bc0 14 D0712 23:58:59.894862 754382 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.894924 754382 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.894963 754382 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.894987 754382 task_signals.go:204] [ 1054: 1055] Signal 1054, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.895071 754382 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.895087 754382 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.895093 754382 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.895118 754382 task_signals.go:204] [ 1054: 1056] Signal 1054, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.895130 754382 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.895138 754382 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.895147 754382 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.895168 754382 task_signals.go:204] [ 1054: 1057] Signal 1054, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.895178 754382 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.895185 754382 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.895192 754382 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.895205 754382 task_signals.go:204] [ 1054: 1058] Signal 1054, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.895216 754382 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.896493 754382 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.896528 754382 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.896543 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.896606 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.896617 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.896775 754382 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.898113 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.900136 754382 syscalls.go:262] [ 1059: 1059] Allocating stack with size of 8388608 bytes D0712 23:58:59.900398 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.901876 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.901972 754382 usertrap_amd64.go:106] [ 1059: 1059] Map a usertrap vma at 63000 D0712 23:58:59.902168 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 1 D0712 23:58:59.902219 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:59.902574 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.902665 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 2 D0712 23:58:59.902694 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:59.903356 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.903384 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 3 D0712 23:58:59.903395 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:59.910972 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.911038 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 4 D0712 23:58:59.911058 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:59.912638 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.912681 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 5 D0712 23:58:59.912701 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:59.912836 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.912856 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 6 D0712 23:58:59.912868 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:59.913846 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.913897 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 7 D0712 23:58:59.913923 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:59.914181 754382 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.914236 754382 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0019e93e0 8 D0712 23:58:59.914257 754382 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:59.914698 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.914743 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 9 D0712 23:58:59.914871 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:59.914945 754382 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.914965 754382 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0019e93e0 10 D0712 23:58:59.914975 754382 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:59.923670 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.923717 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 11 D0712 23:58:59.923728 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:59.926784 754382 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.926840 754382 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0019e93e0 12 D0712 23:58:59.926867 754382 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:59.926915 754382 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.926948 754382 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0019e93e0 13 D0712 23:58:59.926959 754382 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:59.927001 754382 task_signals.go:470] [ 1059: 1059] Notified of signal 23 D0712 23:58:59.927088 754382 task_signals.go:220] [ 1059: 1059] Signal 23: delivering to handler I0712 23:58:59.935611 754382 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0712 23:58:59.935758 754382 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.935785 754382 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0019e93e0 14 D0712 23:58:59.935803 754382 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:59.935921 754382 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.935982 754382 task_signals.go:204] [ 1059: 1063] Signal 1059, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.936007 754382 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.936092 754382 task_signals.go:204] [ 1059: 1064] Signal 1059, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.936114 754382 task_signals.go:204] [ 1059: 1062] Signal 1059, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.936120 754382 task_signals.go:204] [ 1059: 1060] Signal 1059, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.936141 754382 task_exit.go:204] [ 1059: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.936161 754382 task_signals.go:204] [ 1059: 1061] Signal 1059, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.936181 754382 task_exit.go:204] [ 1059: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.936188 754382 task_exit.go:204] [ 1059: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.936206 754382 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.936217 754382 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.936223 754382 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.936235 754382 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.936244 754382 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.936251 754382 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.936263 754382 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.936271 754382 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.936277 754382 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.936286 754382 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.937872 754382 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.937902 754382 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.937921 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.937954 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.937962 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.938256 754382 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.938755 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.940374 754382 syscalls.go:262] [ 1065: 1065] Allocating stack with size of 8388608 bytes D0712 23:58:59.940517 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.941937 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.942008 754382 usertrap_amd64.go:106] [ 1065: 1065] Map a usertrap vma at 61000 D0712 23:58:59.942105 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 1 D0712 23:58:59.942126 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:59.942387 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.942413 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 2 D0712 23:58:59.942425 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:59.942959 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.942999 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 3 D0712 23:58:59.943016 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:59.949540 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.949573 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 4 D0712 23:58:59.949584 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:59.950864 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.950929 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 5 D0712 23:58:59.950950 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:59.951026 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.951047 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 6 D0712 23:58:59.951056 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:59.951510 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.951534 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 7 D0712 23:58:59.951542 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:59.951759 754382 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.951782 754382 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc0004e1d70 8 D0712 23:58:59.951791 754382 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:59.952200 754382 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.952234 754382 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc0004e1d70 9 D0712 23:58:59.952249 754382 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:59.952316 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.952337 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 10 D0712 23:58:59.952352 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:59.952597 754382 usertrap_amd64.go:212] [ 1065: 1068] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.952629 754382 usertrap_amd64.go:122] [ 1065: 1068] Allocate a new trap: 0xc0004e1d70 11 D0712 23:58:59.952642 754382 usertrap_amd64.go:225] [ 1065: 1068] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:59.961184 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.961217 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 12 D0712 23:58:59.961228 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:59.965051 754382 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.965084 754382 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc0004e1d70 13 D0712 23:58:59.965098 754382 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:59.965170 754382 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.965193 754382 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc0004e1d70 14 D0712 23:58:59.965209 754382 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:59.965266 754382 task_signals.go:470] [ 1065: 1065] Notified of signal 23 D0712 23:58:59.965364 754382 task_signals.go:220] [ 1065: 1065] Signal 23: delivering to handler D0712 23:58:59.972617 754382 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.972655 754382 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc0004e1d70 15 D0712 23:58:59.972674 754382 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:58:59.972752 754382 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.972788 754382 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.972819 754382 task_signals.go:204] [ 1065: 1067] Signal 1065, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.972841 754382 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.972820 754382 task_signals.go:204] [ 1065: 1066] Signal 1065, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.972840 754382 task_signals.go:204] [ 1065: 1069] Signal 1065, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.972852 754382 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.972889 754382 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.972818 754382 task_signals.go:204] [ 1065: 1068] Signal 1065, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.972925 754382 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.972984 754382 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.973004 754382 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.973025 754382 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.973033 754382 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.973037 754382 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.973061 754382 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.974587 754382 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.974623 754382 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.974641 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:58:59.974683 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.974695 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:58:59.974783 754382 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.975615 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.977276 754382 syscalls.go:262] [ 1070: 1070] Allocating stack with size of 8388608 bytes D0712 23:58:59.977388 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.978305 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.978363 754382 usertrap_amd64.go:106] [ 1070: 1070] Map a usertrap vma at 62000 D0712 23:58:59.978450 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 1 D0712 23:58:59.978476 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:59.978882 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.978909 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 2 D0712 23:58:59.978919 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:59.979956 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.980016 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 3 D0712 23:58:59.980033 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:59.987499 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.987536 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 4 D0712 23:58:59.987553 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:59.989741 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.989800 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 5 D0712 23:58:59.989822 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:59.989901 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.989918 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 6 D0712 23:58:59.989926 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:59.990138 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.990155 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 7 D0712 23:58:59.990171 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:59.990350 754382 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.990384 754382 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc00137fcb0 8 D0712 23:58:59.990398 754382 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:59.990665 754382 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.990697 754382 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc00137fcb0 9 D0712 23:58:59.990710 754382 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:59.990795 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.990805 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 10 D0712 23:58:59.990815 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:59.991359 754382 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.991396 754382 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc00137fcb0 11 D0712 23:58:59.991410 754382 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:59.991469 754382 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.991487 754382 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc00137fcb0 12 D0712 23:58:59.991503 754382 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:59.991592 754382 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0712 23:58:59.991612 754382 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0712 23:58:59.999061 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.999106 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 13 D0712 23:58:59.999117 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:00.002153 754382 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0712 23:59:00.002209 754382 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0712 23:59:00.011696 754382 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.011738 754382 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc00137fcb0 14 D0712 23:59:00.011755 754382 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:00.011833 754382 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.011866 754382 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.011895 754382 task_signals.go:204] [ 1070: 1071] Signal 1070, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.011914 754382 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.011920 754382 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.011925 754382 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.011959 754382 task_signals.go:204] [ 1070: 1073] Signal 1070, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.011960 754382 task_signals.go:204] [ 1070: 1074] Signal 1070, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.011987 754382 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.012028 754382 task_signals.go:204] [ 1070: 1072] Signal 1070, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.012050 754382 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.012065 754382 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.012109 754382 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.012151 754382 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.012158 754382 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.012172 754382 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.013866 754382 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.013916 754382 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.013934 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.013976 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.013990 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.014258 754382 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.015655 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.017898 754382 syscalls.go:262] [ 1075: 1075] Allocating stack with size of 8388608 bytes D0712 23:59:00.018027 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.019375 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.019425 754382 usertrap_amd64.go:106] [ 1075: 1075] Map a usertrap vma at 64000 D0712 23:59:00.019535 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 1 D0712 23:59:00.019591 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:59:00.020010 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.020034 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 2 D0712 23:59:00.020044 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:59:00.020704 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.020748 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 3 D0712 23:59:00.020757 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:59:00.027784 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.027824 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 4 D0712 23:59:00.027837 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:59:00.029156 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.029201 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 5 D0712 23:59:00.029216 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:59:00.029288 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.029312 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 6 D0712 23:59:00.029322 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:59:00.029764 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.029792 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 7 D0712 23:59:00.029799 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:59:00.030105 754382 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.030134 754382 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc00137fd10 8 D0712 23:59:00.030145 754382 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:59:00.030550 754382 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.030625 754382 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc00137fd10 9 D0712 23:59:00.030647 754382 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:59:00.030801 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.030844 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 10 D0712 23:59:00.030858 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:59:00.030971 754382 usertrap_amd64.go:212] [ 1075: 1078] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.030995 754382 usertrap_amd64.go:122] [ 1075: 1078] Allocate a new trap: 0xc00137fd10 11 D0712 23:59:00.031006 754382 usertrap_amd64.go:225] [ 1075: 1078] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:59:00.039526 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.039565 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 12 D0712 23:59:00.039577 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:59:00.042166 754382 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.042232 754382 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc00137fd10 13 D0712 23:59:00.042261 754382 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:59:00.042298 754382 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.042308 754382 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc00137fd10 14 D0712 23:59:00.042317 754382 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:59:00.042333 754382 task_signals.go:470] [ 1075: 1075] Notified of signal 23 D0712 23:59:00.042435 754382 task_signals.go:220] [ 1075: 1075] Signal 23: delivering to handler D0712 23:59:00.050422 754382 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.050479 754382 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc00137fd10 15 D0712 23:59:00.050499 754382 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 23:59:00.050560 754382 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.050600 754382 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.050649 754382 task_signals.go:204] [ 1075: 1076] Signal 1075, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.050651 754382 task_signals.go:204] [ 1075: 1077] Signal 1075, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.050672 754382 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.050685 754382 task_signals.go:204] [ 1075: 1078] Signal 1075, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.050705 754382 task_signals.go:204] [ 1075: 1079] Signal 1075, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.050742 754382 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.050750 754382 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.050764 754382 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.050772 754382 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.050776 754382 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.050785 754382 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.050793 754382 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.050796 754382 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.050806 754382 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.052211 754382 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.052247 754382 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.052264 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.052306 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.052326 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.052487 754382 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.053641 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.055197 754382 syscalls.go:262] [ 1080: 1080] Allocating stack with size of 8388608 bytes D0712 23:59:00.055348 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.056171 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.056216 754382 usertrap_amd64.go:106] [ 1080: 1080] Map a usertrap vma at 60000 D0712 23:59:00.056320 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 1 D0712 23:59:00.056363 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:59:00.056599 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.056627 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 2 D0712 23:59:00.056638 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:59:00.057331 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.057369 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 3 D0712 23:59:00.057376 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:59:00.063463 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.063488 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 4 D0712 23:59:00.063496 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:59:00.064715 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.064742 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 5 D0712 23:59:00.064749 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:59:00.064800 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.064806 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 6 D0712 23:59:00.064811 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:59:00.065157 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.065184 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 7 D0712 23:59:00.065194 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:59:00.065376 754382 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.065400 754382 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0005fa360 8 D0712 23:59:00.065411 754382 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:59:00.065984 754382 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.066006 754382 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0005fa360 9 D0712 23:59:00.066016 754382 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:59:00.066247 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.066271 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 10 D0712 23:59:00.066282 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:59:00.075017 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.075067 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 11 D0712 23:59:00.075080 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:59:00.078009 754382 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.078050 754382 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0005fa360 12 D0712 23:59:00.078069 754382 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:59:00.078116 754382 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.078144 754382 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0005fa360 13 D0712 23:59:00.078153 754382 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:59:00.078205 754382 task_signals.go:470] [ 1080: 1080] Notified of signal 23 D0712 23:59:00.078233 754382 task_signals.go:220] [ 1080: 1080] Signal 23: delivering to handler D0712 23:59:00.087400 754382 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.087454 754382 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0005fa360 14 D0712 23:59:00.087474 754382 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:59:00.087544 754382 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.087589 754382 task_signals.go:204] [ 1080: 1083] Signal 1080, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.087615 754382 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.087656 754382 task_signals.go:204] [ 1080: 1084] Signal 1080, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.087717 754382 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.087714 754382 task_signals.go:204] [ 1080: 1081] Signal 1080, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.087732 754382 task_signals.go:204] [ 1080: 1082] Signal 1080, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.087748 754382 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.087766 754382 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.087778 754382 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.087788 754382 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.087794 754382 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.087821 754382 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.087830 754382 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.087837 754382 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.087849 754382 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.089631 754382 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.089661 754382 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.089687 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.089782 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.089817 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.089974 754382 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.090685 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.092213 754382 syscalls.go:262] [ 1085: 1085] Allocating stack with size of 8388608 bytes D0712 23:59:00.092312 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.094052 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.094137 754382 usertrap_amd64.go:106] [ 1085: 1085] Map a usertrap vma at 6a000 D0712 23:59:00.094259 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 1 D0712 23:59:00.094312 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:59:00.094860 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.094893 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 2 D0712 23:59:00.094907 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:59:00.096135 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.096163 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 3 D0712 23:59:00.096172 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:59:00.104368 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.104425 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 4 D0712 23:59:00.104445 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:59:00.105774 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.105812 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 5 D0712 23:59:00.105829 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:59:00.106049 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.106075 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 6 D0712 23:59:00.106087 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:59:00.106394 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.106421 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 7 D0712 23:59:00.106429 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:59:00.106714 754382 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.106738 754382 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00137fec0 8 D0712 23:59:00.106746 754382 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:59:00.106853 754382 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.106878 754382 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00137fec0 9 D0712 23:59:00.106885 754382 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:59:00.107102 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.107126 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 10 D0712 23:59:00.107136 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:59:00.116788 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.116834 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 11 D0712 23:59:00.116846 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:59:00.117570 754382 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.117614 754382 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00137fec0 12 D0712 23:59:00.117631 754382 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:59:00.117695 754382 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.117715 754382 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00137fec0 13 D0712 23:59:00.117723 754382 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:59:00.117770 754382 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0712 23:59:00.119707 754382 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0712 23:59:00.120085 754382 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0712 23:59:00.120188 754382 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0712 23:59:00.129095 754382 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.129135 754382 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00137fec0 14 D0712 23:59:00.129150 754382 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.129227 754382 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.129263 754382 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.129289 754382 task_signals.go:204] [ 1085: 1089] Signal 1085, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.129306 754382 task_signals.go:204] [ 1085: 1086] Signal 1085, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.129325 754382 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.129283 754382 task_signals.go:204] [ 1085: 1087] Signal 1085, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.129310 754382 task_signals.go:204] [ 1085: 1088] Signal 1085, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.129336 754382 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.129361 754382 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.129375 754382 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.129395 754382 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.129412 754382 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.129416 754382 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.129428 754382 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.129434 754382 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.129443 754382 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.131254 754382 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.131299 754382 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.131317 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.131403 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.131430 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.131636 754382 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.132424 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.134274 754382 syscalls.go:262] [ 1090: 1090] Allocating stack with size of 8388608 bytes D0712 23:59:00.134374 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.135974 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.136084 754382 usertrap_amd64.go:106] [ 1090: 1090] Map a usertrap vma at 60000 D0712 23:59:00.136218 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 1 D0712 23:59:00.136267 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:59:00.136759 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.136793 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 2 D0712 23:59:00.136801 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:59:00.137561 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.137610 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 3 D0712 23:59:00.137627 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:59:00.144867 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.144911 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 4 D0712 23:59:00.144931 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:59:00.146571 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.146608 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 5 D0712 23:59:00.146618 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:59:00.146691 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.146705 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 6 D0712 23:59:00.146711 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:59:00.147165 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.147187 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 7 D0712 23:59:00.147196 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:59:00.147637 754382 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.147664 754382 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005fa660 8 D0712 23:59:00.147676 754382 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:59:00.147854 754382 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.147884 754382 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005fa660 9 D0712 23:59:00.147895 754382 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:59:00.148041 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.148065 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 10 D0712 23:59:00.148079 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:59:00.155080 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.155123 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 11 D0712 23:59:00.155139 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:59:00.159048 754382 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.159089 754382 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005fa660 12 D0712 23:59:00.159104 754382 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:59:00.159234 754382 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.159258 754382 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005fa660 13 D0712 23:59:00.159267 754382 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:59:00.159309 754382 task_signals.go:470] [ 1090: 1090] Notified of signal 23 D0712 23:59:00.159394 754382 task_signals.go:220] [ 1090: 1090] Signal 23: delivering to handler I0712 23:59:00.165102 754382 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0712 23:59:00.165178 754382 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.165188 754382 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005fa660 14 D0712 23:59:00.165197 754382 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:59:00.165224 754382 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.165257 754382 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.165270 754382 task_signals.go:204] [ 1090: 1092] Signal 1090, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.165308 754382 task_signals.go:204] [ 1090: 1094] Signal 1090, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.165322 754382 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.165313 754382 task_signals.go:204] [ 1090: 1091] Signal 1090, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.165344 754382 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.165280 754382 task_signals.go:204] [ 1090: 1093] Signal 1090, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.165354 754382 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.165382 754382 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.165419 754382 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.165428 754382 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.165444 754382 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.165457 754382 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.165508 754382 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.165524 754382 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.166964 754382 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.167028 754382 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.167046 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.167088 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.167102 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.167197 754382 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.167901 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.169403 754382 syscalls.go:262] [ 1095: 1095] Allocating stack with size of 8388608 bytes D0712 23:59:00.169494 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.171146 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.171196 754382 usertrap_amd64.go:106] [ 1095: 1095] Map a usertrap vma at 66000 D0712 23:59:00.171284 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 1 D0712 23:59:00.171318 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:59:00.171546 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.171565 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 2 D0712 23:59:00.171575 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:59:00.171937 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.171967 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 3 D0712 23:59:00.171978 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:59:00.179029 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.179068 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 4 D0712 23:59:00.179082 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:59:00.180233 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.180272 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 5 D0712 23:59:00.180285 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:59:00.180337 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.180345 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 6 D0712 23:59:00.180353 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:59:00.180534 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.180555 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 7 D0712 23:59:00.180563 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:59:00.180735 754382 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.180764 754382 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0019e9bf0 8 D0712 23:59:00.180775 754382 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:59:00.181031 754382 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.181061 754382 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0019e9bf0 9 D0712 23:59:00.181072 754382 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:59:00.181084 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.181089 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 10 D0712 23:59:00.181093 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:59:00.189475 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.189516 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 11 D0712 23:59:00.189532 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:59:00.192067 754382 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.192098 754382 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0019e9bf0 12 D0712 23:59:00.192111 754382 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:59:00.192180 754382 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.192221 754382 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0019e9bf0 13 D0712 23:59:00.192241 754382 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:59:00.192310 754382 task_signals.go:470] [ 1095: 1095] Notified of signal 23 D0712 23:59:00.192683 754382 task_signals.go:220] [ 1095: 1095] Signal 23: delivering to handler I0712 23:59:00.201986 754382 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0712 23:59:00.202076 754382 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.202088 754382 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0019e9bf0 14 D0712 23:59:00.202099 754382 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:59:00.202126 754382 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.202147 754382 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.202171 754382 task_signals.go:204] [ 1095: 1098] Signal 1095, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.202182 754382 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.202173 754382 task_signals.go:204] [ 1095: 1097] Signal 1095, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.202188 754382 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.202187 754382 task_signals.go:204] [ 1095: 1099] Signal 1095, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.202202 754382 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.202232 754382 task_signals.go:204] [ 1095: 1096] Signal 1095, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.202239 754382 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.202260 754382 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.202265 754382 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.202276 754382 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.202296 754382 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.202311 754382 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.202324 754382 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.203590 754382 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.203618 754382 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.203633 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.203670 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.203679 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.203899 754382 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.204027 754382 task_signals.go:470] [ 6: 15] Notified of signal 23 D0712 23:59:00.204070 754382 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0712 23:59:00.204749 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.206473 754382 syscalls.go:262] [ 1100: 1100] Allocating stack with size of 8388608 bytes D0712 23:59:00.206595 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.208363 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.208414 754382 usertrap_amd64.go:106] [ 1100: 1100] Map a usertrap vma at 62000 D0712 23:59:00.208501 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 1 D0712 23:59:00.208526 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:59:00.208817 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.208847 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 2 D0712 23:59:00.208858 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:59:00.209564 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.209590 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 3 D0712 23:59:00.209599 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:59:00.216755 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.216784 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 4 D0712 23:59:00.216793 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:59:00.218139 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.218171 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 5 D0712 23:59:00.218184 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:59:00.218255 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.218287 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 6 D0712 23:59:00.218297 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:59:00.218641 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.218668 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 7 D0712 23:59:00.218675 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:59:00.218864 754382 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.218879 754382 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0019e9e30 8 D0712 23:59:00.218886 754382 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:59:00.219138 754382 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.219193 754382 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0019e9e30 9 D0712 23:59:00.219212 754382 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:59:00.219362 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.219406 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 10 D0712 23:59:00.219423 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:59:00.219938 754382 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.219959 754382 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0019e9e30 11 D0712 23:59:00.219969 754382 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:59:00.220020 754382 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.220037 754382 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0019e9e30 12 D0712 23:59:00.220048 754382 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:59:00.220093 754382 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0712 23:59:00.220249 754382 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler D0712 23:59:00.227581 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.227648 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 13 D0712 23:59:00.227668 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:00.230718 754382 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0712 23:59:00.230806 754382 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler D0712 23:59:00.240343 754382 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.240381 754382 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0019e9e30 14 D0712 23:59:00.240395 754382 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:00.240472 754382 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.240508 754382 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.240539 754382 task_signals.go:204] [ 1100: 1101] Signal 1100, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.240568 754382 task_signals.go:204] [ 1100: 1104] Signal 1100, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.240581 754382 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.240591 754382 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.240598 754382 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.240577 754382 task_signals.go:204] [ 1100: 1103] Signal 1100, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.240654 754382 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.240683 754382 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.240692 754382 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.240614 754382 task_signals.go:204] [ 1100: 1102] Signal 1100, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.240719 754382 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.240731 754382 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.240738 754382 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.240755 754382 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.242444 754382 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.242484 754382 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.242500 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.242585 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.242622 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.242713 754382 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.243418 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.245420 754382 syscalls.go:262] [ 1105: 1105] Allocating stack with size of 8388608 bytes D0712 23:59:00.245564 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.247009 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.247047 754382 usertrap_amd64.go:106] [ 1105: 1105] Map a usertrap vma at 64000 D0712 23:59:00.247164 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 1 D0712 23:59:00.247192 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:59:00.247374 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.247402 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 2 D0712 23:59:00.247413 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:59:00.248049 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.248101 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 3 D0712 23:59:00.248111 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:59:00.255749 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.255779 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 4 D0712 23:59:00.255790 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:59:00.256905 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.256931 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 5 D0712 23:59:00.256981 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:59:00.257039 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.257062 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 6 D0712 23:59:00.257071 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:59:00.257288 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.257311 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 7 D0712 23:59:00.257318 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:59:00.257456 754382 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.257471 754382 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000f2e330 8 D0712 23:59:00.257483 754382 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:59:00.257619 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.257658 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 9 D0712 23:59:00.257671 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:59:00.257701 754382 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.257709 754382 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000f2e330 10 D0712 23:59:00.257719 754382 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:59:00.287110 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.287166 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 11 D0712 23:59:00.287203 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:59:00.298349 754382 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.298429 754382 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000f2e330 12 D0712 23:59:00.298461 754382 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:59:00.298529 754382 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.298545 754382 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000f2e330 13 D0712 23:59:00.298555 754382 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:59:00.299083 754382 task_signals.go:470] [ 1105: 1105] Notified of signal 23 D0712 23:59:00.299266 754382 task_signals.go:220] [ 1105: 1105] Signal 23: delivering to handler D0712 23:59:00.304359 754382 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.304404 754382 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000f2e330 14 D0712 23:59:00.304441 754382 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:59:00.304534 754382 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.304567 754382 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.304594 754382 task_signals.go:204] [ 1105: 1106] Signal 1105, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.304589 754382 task_signals.go:204] [ 1105: 1107] Signal 1105, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.304612 754382 task_signals.go:204] [ 1105: 1109] Signal 1105, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.304684 754382 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.304837 754382 task_signals.go:204] [ 1105: 1108] Signal 1105, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.304888 754382 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.304900 754382 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.304933 754382 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.305012 754382 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.305027 754382 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.305041 754382 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.305057 754382 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.305061 754382 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.305070 754382 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.307211 754382 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.307243 754382 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.307260 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.307319 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.307355 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.307530 754382 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.308686 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.310506 754382 syscalls.go:262] [ 1110: 1110] Allocating stack with size of 8388608 bytes D0712 23:59:00.310608 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.312346 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.312455 754382 usertrap_amd64.go:106] [ 1110: 1110] Map a usertrap vma at 67000 D0712 23:59:00.312617 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 1 D0712 23:59:00.312681 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.313902 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.313928 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 2 D0712 23:59:00.313939 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.314766 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.314791 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 3 D0712 23:59:00.314803 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.321760 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.321829 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 4 D0712 23:59:00.321851 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.322931 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.322986 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 5 D0712 23:59:00.323000 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.323063 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.323080 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 6 D0712 23:59:00.323088 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.323568 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.323592 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 7 D0712 23:59:00.323598 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.323975 754382 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.323999 754382 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000a800c0 8 D0712 23:59:00.324012 754382 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.324236 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.324277 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 9 D0712 23:59:00.324293 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.324464 754382 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.324483 754382 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000a800c0 10 D0712 23:59:00.324494 754382 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.331550 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.331584 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 11 D0712 23:59:00.331596 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.335810 754382 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.335860 754382 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000a800c0 12 D0712 23:59:00.335876 754382 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.335912 754382 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.335920 754382 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000a800c0 13 D0712 23:59:00.335928 754382 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.336077 754382 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0712 23:59:00.336146 754382 task_signals.go:179] [ 1110: 1110] Restarting syscall 202: interrupted by signal 23 D0712 23:59:00.336162 754382 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0712 23:59:00.341495 754382 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.341598 754382 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000a800c0 14 D0712 23:59:00.341647 754382 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.341712 754382 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.341738 754382 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.341781 754382 task_signals.go:204] [ 1110: 1111] Signal 1110, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.341798 754382 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.341803 754382 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.341807 754382 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.341825 754382 task_signals.go:204] [ 1110: 1112] Signal 1110, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.341831 754382 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.341836 754382 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.341841 754382 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.341856 754382 task_signals.go:204] [ 1110: 1113] Signal 1110, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.341867 754382 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.341876 754382 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.341882 754382 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.341900 754382 task_signals.go:204] [ 1110: 1114] Signal 1110, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.341922 754382 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.341931 754382 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.341936 754382 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.341952 754382 task_signals.go:204] [ 1110: 1115] Signal 1110, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.341962 754382 task_exit.go:204] [ 1110: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.343170 754382 task_exit.go:204] [ 1110: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.343213 754382 task_exit.go:204] [ 1110: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.343231 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.343272 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.343283 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.343363 754382 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.344117 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.345518 754382 syscalls.go:262] [ 1116: 1116] Allocating stack with size of 8388608 bytes D0712 23:59:00.345622 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.347054 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.347106 754382 usertrap_amd64.go:106] [ 1116: 1116] Map a usertrap vma at 65000 D0712 23:59:00.347217 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 1 D0712 23:59:00.347252 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.347678 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.347708 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 2 D0712 23:59:00.347715 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.348328 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.348360 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 3 D0712 23:59:00.348372 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.353956 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.353991 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 4 D0712 23:59:00.354003 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.355021 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.355053 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 5 D0712 23:59:00.355064 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.355225 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.355255 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 6 D0712 23:59:00.355268 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.355503 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.355523 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 7 D0712 23:59:00.355532 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.355691 754382 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.355715 754382 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000a802a0 8 D0712 23:59:00.355728 754382 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.355841 754382 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.355877 754382 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000a802a0 9 D0712 23:59:00.355889 754382 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.355992 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.356053 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 10 D0712 23:59:00.356072 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.362902 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.362934 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 11 D0712 23:59:00.362947 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.366752 754382 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.366785 754382 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000a802a0 12 D0712 23:59:00.366882 754382 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.368346 754382 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.368376 754382 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000a802a0 13 D0712 23:59:00.368394 754382 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.368416 754382 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0712 23:59:00.368484 754382 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0712 23:59:00.372018 754382 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.372050 754382 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000a802a0 14 D0712 23:59:00.372061 754382 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.372138 754382 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.372170 754382 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.372193 754382 task_signals.go:204] [ 1116: 1119] Signal 1116, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.372189 754382 task_signals.go:204] [ 1116: 1118] Signal 1116, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.372207 754382 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.372215 754382 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.372240 754382 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.372246 754382 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.372259 754382 task_signals.go:204] [ 1116: 1117] Signal 1116, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.372264 754382 task_signals.go:204] [ 1116: 1121] Signal 1116, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.372274 754382 task_signals.go:204] [ 1116: 1120] Signal 1116, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.372301 754382 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.372327 754382 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.372340 754382 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.372351 754382 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.372367 754382 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.372377 754382 task_exit.go:204] [ 1116: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.372393 754382 task_exit.go:204] [ 1116: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.372398 754382 task_exit.go:204] [ 1116: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.372407 754382 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.373715 754382 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.373804 754382 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.373867 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.373915 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.373928 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.373933 754382 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.374933 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.376311 754382 syscalls.go:262] [ 1122: 1122] Allocating stack with size of 8388608 bytes D0712 23:59:00.376435 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.377297 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.377327 754382 usertrap_amd64.go:106] [ 1122: 1122] Map a usertrap vma at 67000 D0712 23:59:00.377393 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 1 D0712 23:59:00.377421 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.377772 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.377799 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 2 D0712 23:59:00.377809 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.378300 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.378318 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 3 D0712 23:59:00.378325 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.385417 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.385446 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 4 D0712 23:59:00.385459 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.386485 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.386620 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 5 D0712 23:59:00.386659 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.386912 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.386980 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 6 D0712 23:59:00.387007 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.387280 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.387311 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 7 D0712 23:59:00.387321 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.387447 754382 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.387513 754382 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc00087e330 8 D0712 23:59:00.387571 754382 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.387746 754382 usertrap_amd64.go:212] [ 1122: 1124] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.387793 754382 usertrap_amd64.go:122] [ 1122: 1124] Allocate a new trap: 0xc00087e330 9 D0712 23:59:00.387815 754382 usertrap_amd64.go:225] [ 1122: 1124] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.388075 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.388109 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 10 D0712 23:59:00.388124 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.395221 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.395253 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 11 D0712 23:59:00.395266 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.398443 754382 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.398474 754382 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc00087e330 12 D0712 23:59:00.398487 754382 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.398567 754382 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.398586 754382 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc00087e330 13 D0712 23:59:00.398599 754382 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.398642 754382 task_signals.go:470] [ 1122: 1122] Notified of signal 23 D0712 23:59:00.398733 754382 task_signals.go:220] [ 1122: 1122] Signal 23: delivering to handler D0712 23:59:00.404510 754382 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.404552 754382 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc00087e330 14 D0712 23:59:00.404567 754382 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.404628 754382 task_exit.go:204] [ 1122: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.404676 754382 task_exit.go:204] [ 1122: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.404697 754382 task_signals.go:204] [ 1122: 1124] Signal 1122, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.404730 754382 task_signals.go:204] [ 1122: 1126] Signal 1122, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.404737 754382 task_exit.go:204] [ 1122: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.404708 754382 task_signals.go:204] [ 1122: 1125] Signal 1122, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.404752 754382 task_exit.go:204] [ 1122: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.404761 754382 task_exit.go:204] [ 1122: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.404775 754382 task_exit.go:204] [ 1122: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.404782 754382 task_exit.go:204] [ 1122: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.404799 754382 task_exit.go:204] [ 1122: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.404806 754382 task_exit.go:204] [ 1122: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.404833 754382 task_signals.go:204] [ 1122: 1123] Signal 1122, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.404861 754382 task_exit.go:204] [ 1122: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.404908 754382 task_exit.go:204] [ 1122: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.404932 754382 task_exit.go:204] [ 1122: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.406053 754382 task_exit.go:204] [ 1122: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.406077 754382 task_exit.go:204] [ 1122: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.406094 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.406132 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.406189 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.406356 754382 task_exit.go:204] [ 1122: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.407018 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.408366 754382 syscalls.go:262] [ 1127: 1127] Allocating stack with size of 8388608 bytes D0712 23:59:00.408501 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.411566 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.411606 754382 usertrap_amd64.go:106] [ 1127: 1127] Map a usertrap vma at 65000 D0712 23:59:00.411682 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 1 D0712 23:59:00.411707 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.412783 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.412811 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 2 D0712 23:59:00.412822 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.413572 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.413644 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 3 D0712 23:59:00.413671 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.419883 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.419933 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 4 D0712 23:59:00.419947 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.421327 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.421363 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 5 D0712 23:59:00.421375 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.421490 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.421550 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 6 D0712 23:59:00.421618 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.422303 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.422322 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 7 D0712 23:59:00.422331 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.422935 754382 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.422956 754382 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00087e600 8 D0712 23:59:00.422966 754382 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.423235 754382 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.423296 754382 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00087e600 9 D0712 23:59:00.423319 754382 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.423368 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.423376 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 10 D0712 23:59:00.423427 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.433216 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.433265 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 11 D0712 23:59:00.433279 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.436306 754382 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.436368 754382 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00087e600 12 D0712 23:59:00.436388 754382 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.436451 754382 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.436497 754382 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00087e600 13 D0712 23:59:00.436547 754382 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.436622 754382 task_signals.go:470] [ 1127: 1127] Notified of signal 23 D0712 23:59:00.436698 754382 task_signals.go:220] [ 1127: 1127] Signal 23: delivering to handler D0712 23:59:00.445657 754382 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.445693 754382 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00087e600 14 D0712 23:59:00.445708 754382 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.445787 754382 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.445820 754382 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.445855 754382 task_signals.go:204] [ 1127: 1131] Signal 1127, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.445853 754382 task_signals.go:204] [ 1127: 1129] Signal 1127, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.445884 754382 task_signals.go:204] [ 1127: 1130] Signal 1127, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.445895 754382 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.445962 754382 task_signals.go:204] [ 1127: 1128] Signal 1127, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.445983 754382 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.445997 754382 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.446012 754382 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.446020 754382 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.446025 754382 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.446065 754382 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.446072 754382 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.446078 754382 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.446086 754382 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.447851 754382 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.447888 754382 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.447902 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.447938 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.447951 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.448051 754382 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.448897 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.450746 754382 syscalls.go:262] [ 1132: 1132] Allocating stack with size of 8388608 bytes D0712 23:59:00.450970 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.452682 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.452725 754382 usertrap_amd64.go:106] [ 1132: 1132] Map a usertrap vma at 62000 D0712 23:59:00.452881 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 1 D0712 23:59:00.452918 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:59:00.453431 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.453473 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 2 D0712 23:59:00.453487 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:59:00.454328 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.454367 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 3 D0712 23:59:00.454382 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:59:00.461561 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.461594 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 4 D0712 23:59:00.461608 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:59:00.462744 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.462774 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 5 D0712 23:59:00.462788 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:59:00.462856 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.462898 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 6 D0712 23:59:00.462907 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:59:00.463322 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.463344 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 7 D0712 23:59:00.463352 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:59:00.463593 754382 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.463618 754382 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc000f2e6c0 8 D0712 23:59:00.463630 754382 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:59:00.463868 754382 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.463892 754382 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc000f2e6c0 9 D0712 23:59:00.463905 754382 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:59:00.464006 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.464023 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 10 D0712 23:59:00.464042 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:59:00.464636 754382 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.464669 754382 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc000f2e6c0 11 D0712 23:59:00.464686 754382 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:59:00.464746 754382 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.464770 754382 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc000f2e6c0 12 D0712 23:59:00.464779 754382 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:59:00.464892 754382 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0712 23:59:00.465007 754382 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler D0712 23:59:00.472509 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.472540 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 13 D0712 23:59:00.472554 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:00.475251 754382 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0712 23:59:00.475369 754382 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler D0712 23:59:00.484736 754382 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.484779 754382 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc000f2e6c0 14 D0712 23:59:00.484794 754382 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:00.484856 754382 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.484886 754382 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.485014 754382 task_signals.go:204] [ 1132: 1134] Signal 1132, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.485031 754382 task_signals.go:204] [ 1132: 1136] Signal 1132, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.485047 754382 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.485042 754382 task_signals.go:204] [ 1132: 1133] Signal 1132, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.485022 754382 task_signals.go:204] [ 1132: 1135] Signal 1132, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.485059 754382 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.485075 754382 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.485084 754382 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.485115 754382 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.485126 754382 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.485133 754382 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.485147 754382 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.485205 754382 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.485226 754382 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.486798 754382 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.486826 754382 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.486840 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.486871 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.486882 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.487069 754382 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.487179 754382 task_signals.go:470] [ 6: 20] Notified of signal 23 D0712 23:59:00.487218 754382 task_signals.go:179] [ 6: 20] Restarting syscall 202: interrupted by signal 23 D0712 23:59:00.487237 754382 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0712 23:59:00.487693 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.489441 754382 syscalls.go:262] [ 1137: 1137] Allocating stack with size of 8388608 bytes D0712 23:59:00.489771 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.491124 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.491191 754382 usertrap_amd64.go:106] [ 1137: 1137] Map a usertrap vma at 66000 D0712 23:59:00.491368 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 1 D0712 23:59:00.491408 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:59:00.491757 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.491777 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 2 D0712 23:59:00.491785 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:59:00.492476 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.492499 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 3 D0712 23:59:00.492508 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:59:00.499873 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.499906 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 4 D0712 23:59:00.499919 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:59:00.501324 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.501359 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 5 D0712 23:59:00.501369 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:59:00.501410 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.501415 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 6 D0712 23:59:00.501423 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:59:00.501623 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.501642 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 7 D0712 23:59:00.501654 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:59:00.501800 754382 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.501821 754382 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005fa540 8 D0712 23:59:00.501833 754382 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:59:00.501946 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.502040 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 9 D0712 23:59:00.502186 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:59:00.502236 754382 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.502246 754382 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005fa540 10 D0712 23:59:00.502279 754382 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:59:00.510563 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.510586 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 11 D0712 23:59:00.510595 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:59:00.513592 754382 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.513677 754382 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005fa540 12 D0712 23:59:00.513700 754382 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:59:00.513874 754382 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.513958 754382 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005fa540 13 D0712 23:59:00.513979 754382 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:59:00.514037 754382 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0712 23:59:00.514172 754382 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0712 23:59:00.522261 754382 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.522287 754382 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005fa540 14 D0712 23:59:00.522303 754382 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:59:00.522340 754382 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.522383 754382 task_signals.go:204] [ 1137: 1142] Signal 1137, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.522411 754382 task_signals.go:204] [ 1137: 1139] Signal 1137, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.522430 754382 task_signals.go:204] [ 1137: 1138] Signal 1137, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.522442 754382 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.522461 754382 task_signals.go:204] [ 1137: 1140] Signal 1137, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.522472 754382 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.522472 754382 task_signals.go:204] [ 1137: 1141] Signal 1137, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.522482 754382 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.522493 754382 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.522556 754382 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.522599 754382 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.522608 754382 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.522621 754382 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.522637 754382 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.522649 754382 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.522662 754382 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.522671 754382 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.522687 754382 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.522697 754382 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.524268 754382 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.524337 754382 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.524353 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.524431 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.524457 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.524487 754382 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.525288 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.526906 754382 syscalls.go:262] [ 1143: 1143] Allocating stack with size of 8388608 bytes D0712 23:59:00.527134 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.529021 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.529056 754382 usertrap_amd64.go:106] [ 1143: 1143] Map a usertrap vma at 6a000 D0712 23:59:00.529195 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 1 D0712 23:59:00.529235 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:59:00.529908 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.529938 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 2 D0712 23:59:00.529976 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:59:00.530499 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.530521 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 3 D0712 23:59:00.530528 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:59:00.538669 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.538764 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 4 D0712 23:59:00.538784 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:59:00.540523 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.540629 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 5 D0712 23:59:00.540670 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:59:00.540847 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.540908 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 6 D0712 23:59:00.540931 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:59:00.541645 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.541684 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 7 D0712 23:59:00.541700 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:59:00.541993 754382 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.542024 754382 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc0005fa690 8 D0712 23:59:00.542037 754382 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:59:00.542362 754382 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.542396 754382 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc0005fa690 9 D0712 23:59:00.542412 754382 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:59:00.542439 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.542457 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 10 D0712 23:59:00.542478 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:59:00.542628 754382 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.542653 754382 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc0005fa690 11 D0712 23:59:00.542665 754382 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:59:00.542736 754382 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.542768 754382 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc0005fa690 12 D0712 23:59:00.542784 754382 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:59:00.542915 754382 task_signals.go:470] [ 1143: 1146] Notified of signal 23 D0712 23:59:00.543039 754382 task_signals.go:179] [ 1143: 1146] Restarting syscall 202: interrupted by signal 23 D0712 23:59:00.543071 754382 task_signals.go:220] [ 1143: 1146] Signal 23: delivering to handler D0712 23:59:00.543625 754382 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0712 23:59:00.543759 754382 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler D0712 23:59:00.552325 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.552355 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 13 D0712 23:59:00.552366 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:59:00.554285 754382 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0712 23:59:00.554878 754382 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler I0712 23:59:00.564933 754382 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0712 23:59:00.565111 754382 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.565136 754382 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc0005fa690 14 D0712 23:59:00.565150 754382 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.565233 754382 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.565272 754382 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.565275 754382 task_signals.go:204] [ 1143: 1145] Signal 1143, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.565298 754382 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.565310 754382 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.565311 754382 task_signals.go:204] [ 1143: 1144] Signal 1143, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.565316 754382 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.565331 754382 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.565353 754382 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.565360 754382 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.565330 754382 task_signals.go:204] [ 1143: 1146] Signal 1143, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.565393 754382 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.565400 754382 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.565404 754382 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.565416 754382 task_signals.go:204] [ 1143: 1147] Signal 1143, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.565424 754382 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.566888 754382 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.566924 754382 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.566938 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.566966 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.566975 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.567241 754382 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.568012 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.569752 754382 syscalls.go:262] [ 1148: 1148] Allocating stack with size of 8388608 bytes D0712 23:59:00.569911 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.571432 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.571483 754382 usertrap_amd64.go:106] [ 1148: 1148] Map a usertrap vma at 65000 D0712 23:59:00.571619 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 1 D0712 23:59:00.571664 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.572176 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.572242 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 2 D0712 23:59:00.572264 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.573272 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.573310 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 3 D0712 23:59:00.573324 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.580687 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.580739 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 4 D0712 23:59:00.580756 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.582173 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.582208 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 5 D0712 23:59:00.582225 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.582303 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.582313 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 6 D0712 23:59:00.582320 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.582774 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.582797 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 7 D0712 23:59:00.582804 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.582999 754382 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.583031 754382 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00087ebd0 8 D0712 23:59:00.583047 754382 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.583273 754382 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.583304 754382 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00087ebd0 9 D0712 23:59:00.583317 754382 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.583506 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.583534 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 10 D0712 23:59:00.583547 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.583565 754382 usertrap_amd64.go:212] [ 1148: 1151] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.583572 754382 usertrap_amd64.go:122] [ 1148: 1151] Allocate a new trap: 0xc00087ebd0 11 D0712 23:59:00.583581 754382 usertrap_amd64.go:225] [ 1148: 1151] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.593014 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.593074 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 12 D0712 23:59:00.593091 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.596421 754382 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.596474 754382 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00087ebd0 13 D0712 23:59:00.596499 754382 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.596528 754382 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.596534 754382 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00087ebd0 14 D0712 23:59:00.596544 754382 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.596599 754382 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0712 23:59:00.596739 754382 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0712 23:59:00.606493 754382 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.606545 754382 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00087ebd0 15 D0712 23:59:00.606564 754382 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 23:59:00.606654 754382 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.606780 754382 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.606818 754382 task_signals.go:204] [ 1148: 1150] Signal 1148, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.606836 754382 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.606845 754382 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.606853 754382 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.606873 754382 task_signals.go:204] [ 1148: 1149] Signal 1148, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.606885 754382 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.606893 754382 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.606898 754382 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.606913 754382 task_signals.go:204] [ 1148: 1152] Signal 1148, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.606934 754382 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.606942 754382 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.606949 754382 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.606969 754382 task_signals.go:204] [ 1148: 1151] Signal 1148, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.606990 754382 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.608734 754382 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.608777 754382 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.608796 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.608840 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.608860 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.609017 754382 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.609791 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.611101 754382 syscalls.go:262] [ 1153: 1153] Allocating stack with size of 8388608 bytes D0712 23:59:00.611220 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.612107 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.612176 754382 usertrap_amd64.go:106] [ 1153: 1153] Map a usertrap vma at 67000 D0712 23:59:00.612507 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 1 D0712 23:59:00.612556 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.613477 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.613535 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 2 D0712 23:59:00.613553 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.614285 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.614319 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 3 D0712 23:59:00.614330 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.622503 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.622542 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 4 D0712 23:59:00.622558 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.623853 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.623904 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 5 D0712 23:59:00.623952 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.624121 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.624168 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 6 D0712 23:59:00.624183 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.624840 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.624882 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 7 D0712 23:59:00.624899 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.625193 754382 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.625218 754382 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00087ed50 8 D0712 23:59:00.625227 754382 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.625521 754382 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.625551 754382 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00087ed50 9 D0712 23:59:00.625588 754382 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.625707 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.625735 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 10 D0712 23:59:00.625776 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.634395 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.634436 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 11 D0712 23:59:00.634450 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.637295 754382 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.637354 754382 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00087ed50 12 D0712 23:59:00.637375 754382 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.637453 754382 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.637474 754382 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00087ed50 13 D0712 23:59:00.637484 754382 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.637545 754382 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0712 23:59:00.637653 754382 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0712 23:59:00.646583 754382 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.646644 754382 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00087ed50 14 D0712 23:59:00.646663 754382 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.646738 754382 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.646774 754382 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.646809 754382 task_signals.go:204] [ 1153: 1156] Signal 1153, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.646830 754382 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.646811 754382 task_signals.go:204] [ 1153: 1155] Signal 1153, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.646841 754382 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.646863 754382 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.646915 754382 task_signals.go:204] [ 1153: 1157] Signal 1153, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.646919 754382 task_signals.go:204] [ 1153: 1158] Signal 1153, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.646927 754382 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.646828 754382 task_signals.go:204] [ 1153: 1154] Signal 1153, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.646944 754382 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.646962 754382 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.646979 754382 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.646993 754382 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.647011 754382 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.647018 754382 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.647029 754382 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.647115 754382 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.647142 754382 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.648533 754382 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.648569 754382 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.648582 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.649067 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.649105 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.649149 754382 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.649753 754382 task_signals.go:481] [ 6: 22] No task notified of signal 23 D0712 23:59:00.649982 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.651848 754382 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0712 23:59:00.652137 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.652333 754382 task_signals.go:220] [ 6: 22] Signal 23: delivering to handler D0712 23:59:00.653444 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.653490 754382 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 60000 D0712 23:59:00.653576 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 1 D0712 23:59:00.653604 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:59:00.654087 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.654136 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 2 D0712 23:59:00.654157 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:59:00.655035 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.655064 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 3 D0712 23:59:00.655080 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:59:00.662101 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.662157 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 4 D0712 23:59:00.662178 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:59:00.663678 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.663708 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 5 D0712 23:59:00.663721 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:59:00.663764 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.663769 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 6 D0712 23:59:00.663776 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:59:00.664186 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.664209 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 7 D0712 23:59:00.664218 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:59:00.664526 754382 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.664549 754382 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0005faa50 8 D0712 23:59:00.664563 754382 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:59:00.664891 754382 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.664970 754382 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0005faa50 9 D0712 23:59:00.665013 754382 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:59:00.665037 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.665056 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 10 D0712 23:59:00.665072 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:59:00.674215 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.674256 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 11 D0712 23:59:00.674270 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:59:00.677430 754382 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.677477 754382 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0005faa50 12 D0712 23:59:00.677494 754382 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:59:00.677528 754382 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.677572 754382 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0005faa50 13 D0712 23:59:00.677587 754382 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:59:00.677649 754382 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0712 23:59:00.677753 754382 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0712 23:59:00.686147 754382 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.686183 754382 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0005faa50 14 D0712 23:59:00.686195 754382 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:59:00.686305 754382 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.686343 754382 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.686370 754382 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.686390 754382 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.686401 754382 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.686399 754382 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.686457 754382 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.686498 754382 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.686368 754382 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.686513 754382 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.686519 754382 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.686525 754382 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.686543 754382 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.686562 754382 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.686569 754382 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.686580 754382 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.688064 754382 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.688104 754382 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.688120 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.688159 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.688181 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.688248 754382 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.689022 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.690768 754382 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0712 23:59:00.690933 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.692441 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.692480 754382 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 61000 D0712 23:59:00.692587 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 1 D0712 23:59:00.692621 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:59:00.693079 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.693140 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 2 D0712 23:59:00.693156 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:59:00.693872 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.693894 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 3 D0712 23:59:00.693904 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:59:00.700146 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.700175 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 4 D0712 23:59:00.700186 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:59:00.701315 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.701334 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 5 D0712 23:59:00.701342 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:59:00.701355 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.701360 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 6 D0712 23:59:00.701365 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:59:00.701805 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.701835 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 7 D0712 23:59:00.701849 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:59:00.702005 754382 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.702025 754382 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc00262c7b0 8 D0712 23:59:00.702034 754382 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:59:00.702188 754382 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.702210 754382 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc00262c7b0 9 D0712 23:59:00.702223 754382 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:59:00.702378 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.702406 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 10 D0712 23:59:00.702416 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:59:00.709857 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.709871 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 11 D0712 23:59:00.709880 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:59:00.712704 754382 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.712733 754382 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc00262c7b0 12 D0712 23:59:00.712777 754382 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:59:00.712844 754382 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.712896 754382 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc00262c7b0 13 D0712 23:59:00.712918 754382 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:59:00.712998 754382 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0712 23:59:00.713095 754382 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0712 23:59:00.721362 754382 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.721393 754382 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc00262c7b0 14 D0712 23:59:00.721406 754382 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:59:00.721534 754382 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.721559 754382 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.721586 754382 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.721606 754382 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.721612 754382 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.721603 754382 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.721615 754382 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.721697 754382 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.721715 754382 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.721744 754382 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.721761 754382 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.721774 754382 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.721787 754382 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.721804 754382 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.721809 754382 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.721817 754382 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.723505 754382 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.723544 754382 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.723561 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.723596 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.723605 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.723673 754382 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.723751 754382 task_signals.go:470] [ 6: 20] Notified of signal 23 D0712 23:59:00.723781 754382 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0712 23:59:00.724565 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.726472 754382 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0712 23:59:00.726568 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.727970 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.728011 754382 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 63000 D0712 23:59:00.728208 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 1 D0712 23:59:00.728241 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:59:00.728688 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.728704 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 2 D0712 23:59:00.728715 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:59:00.729401 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.729421 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 3 D0712 23:59:00.729432 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:59:00.735561 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.735628 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 4 D0712 23:59:00.735654 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:59:00.736974 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.737015 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 5 D0712 23:59:00.737029 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:59:00.737075 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.737085 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 6 D0712 23:59:00.737095 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:59:00.737487 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.737510 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 7 D0712 23:59:00.737518 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:59:00.737680 754382 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.737702 754382 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00262c960 8 D0712 23:59:00.737714 754382 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:59:00.737808 754382 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.737840 754382 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00262c960 9 D0712 23:59:00.737852 754382 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:59:00.738072 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.738126 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 10 D0712 23:59:00.738135 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:59:00.738314 754382 usertrap_amd64.go:212] [ 1169: 1172] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.738363 754382 usertrap_amd64.go:122] [ 1169: 1172] Allocate a new trap: 0xc00262c960 11 D0712 23:59:00.738383 754382 usertrap_amd64.go:225] [ 1169: 1172] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:59:00.746889 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.746924 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 12 D0712 23:59:00.746941 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:59:00.750821 754382 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.750847 754382 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00262c960 13 D0712 23:59:00.750858 754382 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:59:00.750931 754382 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.750951 754382 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00262c960 14 D0712 23:59:00.750961 754382 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:59:00.751001 754382 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0712 23:59:00.751055 754382 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0712 23:59:00.755896 754382 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0712 23:59:00.759564 754382 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.759594 754382 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00262c960 15 D0712 23:59:00.759605 754382 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 23:59:00.759679 754382 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.759701 754382 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.759727 754382 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.759754 754382 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.759753 754382 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.759765 754382 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.759771 754382 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.759727 754382 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.759810 754382 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.759822 754382 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.759833 754382 task_signals.go:204] [ 1169: 1174] Signal 1169, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.759841 754382 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.759846 754382 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.759866 754382 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.759890 754382 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.759894 754382 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.759911 754382 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.759941 754382 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.759947 754382 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.759969 754382 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.761390 754382 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.761430 754382 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.761455 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.761523 754382 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.761513 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.761558 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.762028 754382 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.764327 754382 syscalls.go:262] [ 1175: 1175] Allocating stack with size of 8388608 bytes D0712 23:59:00.764484 754382 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.766503 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.766539 754382 usertrap_amd64.go:106] [ 1175: 1175] Map a usertrap vma at 67000 D0712 23:59:00.766620 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 1 D0712 23:59:00.766660 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.767061 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.767081 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 2 D0712 23:59:00.767090 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.767790 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.767840 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 3 D0712 23:59:00.767861 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.774571 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.774601 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 4 D0712 23:59:00.774612 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.775688 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.775720 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 5 D0712 23:59:00.775736 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.775793 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.775810 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 6 D0712 23:59:00.775819 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.776120 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.776152 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 7 D0712 23:59:00.776163 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.776397 754382 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.776428 754382 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00087f1a0 8 D0712 23:59:00.776443 754382 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.776660 754382 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.776702 754382 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00087f1a0 9 D0712 23:59:00.776720 754382 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.776787 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.776930 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 10 D0712 23:59:00.776987 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.785515 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.785542 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 11 D0712 23:59:00.785587 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.788424 754382 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.788451 754382 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00087f1a0 12 D0712 23:59:00.788462 754382 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.788490 754382 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.788499 754382 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00087f1a0 13 D0712 23:59:00.788507 754382 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.788545 754382 task_signals.go:470] [ 1175: 1175] Notified of signal 23 D0712 23:59:00.788621 754382 task_signals.go:220] [ 1175: 1175] Signal 23: delivering to handler D0712 23:59:00.798116 754382 sys_signal.go:495] [ 1175: 1175] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0712 23:59:00.798217 754382 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.798235 754382 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00087f1a0 14 D0712 23:59:00.798248 754382 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.798306 754382 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.798338 754382 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.798373 754382 task_signals.go:204] [ 1175: 1176] Signal 1175, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.798396 754382 task_signals.go:204] [ 1175: 1177] Signal 1175, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.798403 754382 task_signals.go:204] [ 1175: 1179] Signal 1175, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.798415 754382 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.798439 754382 task_signals.go:204] [ 1175: 1178] Signal 1175, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.798456 754382 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.798481 754382 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.798501 754382 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.798514 754382 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.798520 754382 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.798532 754382 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.798543 754382 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.798548 754382 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.798563 754382 task_signals.go:204] [ 1175: 1180] Signal 1175, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.798567 754382 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.798598 754382 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.798605 754382 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.798652 754382 task_exit.go:204] [ 1175: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.800227 754382 task_exit.go:204] [ 1175: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.800299 754382 task_exit.go:204] [ 1175: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.800324 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.800360 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.800402 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.800431 754382 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.801141 754382 task_signals.go:470] [ 6: 22] Notified of signal 23 D0712 23:59:00.801337 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.803148 754382 syscalls.go:262] [ 1181: 1181] Allocating stack with size of 8388608 bytes D0712 23:59:00.803250 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.803407 754382 task_signals.go:220] [ 6: 22] Signal 23: delivering to handler D0712 23:59:00.804317 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.804361 754382 usertrap_amd64.go:106] [ 1181: 1181] Map a usertrap vma at 67000 D0712 23:59:00.804477 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 1 D0712 23:59:00.804519 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.805184 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.805216 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 2 D0712 23:59:00.805230 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.806007 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.806024 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 3 D0712 23:59:00.806037 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.812750 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.812828 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 4 D0712 23:59:00.812853 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.814291 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.814326 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 5 D0712 23:59:00.814341 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.814402 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.814407 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 6 D0712 23:59:00.814425 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.815120 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.815164 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 7 D0712 23:59:00.815199 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.815415 754382 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.815462 754382 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc00262cab0 8 D0712 23:59:00.815483 754382 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.815785 754382 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.815818 754382 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc00262cab0 9 D0712 23:59:00.815837 754382 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.815886 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.815916 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 10 D0712 23:59:00.815931 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.816174 754382 usertrap_amd64.go:212] [ 1181: 1184] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.816205 754382 usertrap_amd64.go:122] [ 1181: 1184] Allocate a new trap: 0xc00262cab0 11 D0712 23:59:00.816218 754382 usertrap_amd64.go:225] [ 1181: 1184] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.825391 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.825432 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 12 D0712 23:59:00.825448 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.826463 754382 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.826502 754382 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc00262cab0 13 D0712 23:59:00.828410 754382 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.828513 754382 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.828525 754382 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc00262cab0 14 D0712 23:59:00.828535 754382 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.828619 754382 task_signals.go:470] [ 1181: 1181] Notified of signal 23 D0712 23:59:00.828738 754382 task_signals.go:220] [ 1181: 1181] Signal 23: delivering to handler D0712 23:59:00.837850 754382 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.837889 754382 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc00262cab0 15 D0712 23:59:00.837912 754382 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0712 23:59:00.837982 754382 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.838010 754382 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.838030 754382 task_signals.go:204] [ 1181: 1183] Signal 1181, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.838064 754382 task_signals.go:204] [ 1181: 1185] Signal 1181, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.838069 754382 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.838046 754382 task_signals.go:204] [ 1181: 1184] Signal 1181, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.838092 754382 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.838100 754382 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.838120 754382 task_signals.go:204] [ 1181: 1182] Signal 1181, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.838143 754382 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.838153 754382 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.838158 754382 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.838172 754382 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.838181 754382 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.838187 754382 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.838208 754382 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.839685 754382 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.839713 754382 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.839738 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.839802 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.839813 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.839965 754382 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.840448 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.841914 754382 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0712 23:59:00.842017 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.843680 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.843729 754382 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 6a000 D0712 23:59:00.843806 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 1 D0712 23:59:00.843834 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:59:00.844288 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.844306 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 2 D0712 23:59:00.844317 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:59:00.845050 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.845091 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 3 D0712 23:59:00.845110 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:59:00.852454 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.852513 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 4 D0712 23:59:00.852531 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:59:00.853928 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.853965 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 5 D0712 23:59:00.853978 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:59:00.854035 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.854053 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 6 D0712 23:59:00.854081 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:59:00.854339 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.854359 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 7 D0712 23:59:00.854365 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:59:00.854501 754382 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.854523 754382 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc00262ccc0 8 D0712 23:59:00.854533 754382 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:59:00.854729 754382 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.854753 754382 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc00262ccc0 9 D0712 23:59:00.854764 754382 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:59:00.854972 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.854989 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 10 D0712 23:59:00.854999 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:59:00.862949 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.862995 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 11 D0712 23:59:00.863011 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:59:00.865793 754382 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.865835 754382 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc00262ccc0 12 D0712 23:59:00.865853 754382 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:59:00.865952 754382 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.866003 754382 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc00262ccc0 13 D0712 23:59:00.866026 754382 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:59:00.866091 754382 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0712 23:59:00.866215 754382 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0712 23:59:00.874538 754382 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.874588 754382 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc00262ccc0 14 D0712 23:59:00.874604 754382 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.874683 754382 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.874710 754382 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.874740 754382 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.874735 754382 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.874766 754382 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.874777 754382 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.874779 754382 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.874784 754382 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.874820 754382 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.874858 754382 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.874873 754382 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.874878 754382 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.874891 754382 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.874897 754382 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.874901 754382 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.874908 754382 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.876413 754382 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.876456 754382 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.876469 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.876505 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.876512 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.876772 754382 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.877672 754382 task_stop.go:118] [ 6: 22] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.879585 754382 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0712 23:59:00.879732 754382 task_stop.go:138] [ 6: 22] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.881121 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.881213 754382 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 65000 D0712 23:59:00.881385 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 1 D0712 23:59:00.881431 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.881982 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.882003 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 2 D0712 23:59:00.882011 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.882901 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.882931 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 3 D0712 23:59:00.882941 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.891930 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.891972 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 4 D0712 23:59:00.891983 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.893542 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.893583 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 5 D0712 23:59:00.893597 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.893671 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.893699 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 6 D0712 23:59:00.893709 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.894279 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.894306 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 7 D0712 23:59:00.894314 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.894666 754382 usertrap_amd64.go:212] [ 1191: 1193] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.894692 754382 usertrap_amd64.go:122] [ 1191: 1193] Allocate a new trap: 0xc000f2ef90 8 D0712 23:59:00.894705 754382 usertrap_amd64.go:225] [ 1191: 1193] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.895207 754382 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.895231 754382 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000f2ef90 9 D0712 23:59:00.895238 754382 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.895248 754382 usertrap_amd64.go:212] [ 1191: 1194] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.895253 754382 usertrap_amd64.go:122] [ 1191: 1194] Allocate a new trap: 0xc000f2ef90 10 D0712 23:59:00.895258 754382 usertrap_amd64.go:225] [ 1191: 1194] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.904320 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.904391 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 11 D0712 23:59:00.904413 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.905416 754382 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.905458 754382 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000f2ef90 12 D0712 23:59:00.905474 754382 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.905516 754382 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.905524 754382 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000f2ef90 13 D0712 23:59:00.905531 754382 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.905554 754382 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0712 23:59:00.906150 754382 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0712 23:59:00.917663 754382 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.917716 754382 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000f2ef90 14 D0712 23:59:00.917734 754382 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.917816 754382 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.917843 754382 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.917868 754382 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.917926 754382 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.917995 754382 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.918019 754382 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.918023 754382 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.918085 754382 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.918167 754382 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.918177 754382 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.918233 754382 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.918306 754382 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.918315 754382 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.918319 754382 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.918332 754382 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.918350 754382 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.919864 754382 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.919904 754382 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.919919 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.919951 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.919961 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.920160 754382 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.921025 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.922838 754382 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0712 23:59:00.922981 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.925726 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.925779 754382 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 64000 D0712 23:59:00.926023 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 1 D0712 23:59:00.926065 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:59:00.926669 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.926689 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 2 D0712 23:59:00.926698 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:59:00.927790 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.927815 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 3 D0712 23:59:00.927826 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:59:00.935186 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.935237 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 4 D0712 23:59:00.935254 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:59:00.936904 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.937008 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 5 D0712 23:59:00.937035 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:59:00.937107 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.937114 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 6 D0712 23:59:00.937121 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:59:00.937541 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.937566 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 7 D0712 23:59:00.937577 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:59:00.937847 754382 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.937906 754382 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc00262cde0 8 D0712 23:59:00.937928 754382 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:59:00.938359 754382 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.938394 754382 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc00262cde0 9 D0712 23:59:00.938408 754382 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:59:00.938451 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.938481 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 10 D0712 23:59:00.938497 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:59:00.939108 754382 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.939145 754382 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc00262cde0 11 D0712 23:59:00.939167 754382 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:59:00.939234 754382 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.939245 754382 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc00262cde0 12 D0712 23:59:00.939259 754382 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:59:00.939307 754382 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0712 23:59:00.939356 754382 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0712 23:59:00.947309 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.947383 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 13 D0712 23:59:00.947397 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:59:00.950412 754382 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0712 23:59:00.950581 754382 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0712 23:59:00.958957 754382 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.959020 754382 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc00262cde0 14 D0712 23:59:00.959041 754382 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:59:00.959074 754382 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.959098 754382 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.959105 754382 task_signals.go:204] [ 1196: 1201] Signal 1196, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.959148 754382 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.959125 754382 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.959142 754382 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.959162 754382 task_exit.go:204] [ 1196: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.959105 754382 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.959186 754382 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.959197 754382 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.959219 754382 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.959227 754382 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.959248 754382 task_exit.go:204] [ 1196: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.959256 754382 task_exit.go:204] [ 1196: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.959268 754382 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.959290 754382 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.959304 754382 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.959320 754382 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.959504 754382 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.959532 754382 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.960899 754382 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.960925 754382 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.960977 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:00.961018 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.961030 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:00.961247 754382 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.962070 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.963783 754382 syscalls.go:262] [ 1202: 1202] Allocating stack with size of 8388608 bytes D0712 23:59:00.963920 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.965645 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.965705 754382 usertrap_amd64.go:106] [ 1202: 1202] Map a usertrap vma at 63000 D0712 23:59:00.965807 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 1 D0712 23:59:00.965833 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:59:00.966281 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.966302 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 2 D0712 23:59:00.966311 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:59:00.966965 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.966999 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 3 D0712 23:59:00.967013 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:59:00.976203 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.976254 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 4 D0712 23:59:00.976273 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:59:00.977874 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.977936 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 5 D0712 23:59:00.977956 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:59:00.978028 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.978049 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 6 D0712 23:59:00.978061 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:59:00.978659 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.978677 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 7 D0712 23:59:00.978688 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:59:00.978992 754382 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.979021 754382 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc00262cff0 8 D0712 23:59:00.979031 754382 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:59:00.979397 754382 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.979596 754382 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc00262cff0 9 D0712 23:59:00.979632 754382 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:59:00.979801 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.979833 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 10 D0712 23:59:00.979846 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:59:00.979935 754382 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.980008 754382 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc00262cff0 11 D0712 23:59:00.980057 754382 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:59:00.980227 754382 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.980256 754382 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc00262cff0 12 D0712 23:59:00.980272 754382 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:59:00.980600 754382 task_signals.go:470] [ 1202: 1205] Notified of signal 23 D0712 23:59:00.980675 754382 task_signals.go:179] [ 1202: 1205] Restarting syscall 202: interrupted by signal 23 D0712 23:59:00.980690 754382 task_signals.go:220] [ 1202: 1205] Signal 23: delivering to handler D0712 23:59:00.988508 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.988554 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 13 D0712 23:59:00.988571 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:59:00.991447 754382 task_signals.go:470] [ 1202: 1202] Notified of signal 23 D0712 23:59:00.991522 754382 task_signals.go:220] [ 1202: 1202] Signal 23: delivering to handler D0712 23:59:01.000562 754382 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.000603 754382 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc00262cff0 14 D0712 23:59:01.000623 754382 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:59:01.000702 754382 task_exit.go:204] [ 1202: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.000740 754382 task_exit.go:204] [ 1202: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.000764 754382 task_signals.go:204] [ 1202: 1204] Signal 1202, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.000774 754382 task_signals.go:204] [ 1202: 1206] Signal 1202, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.000785 754382 task_signals.go:204] [ 1202: 1205] Signal 1202, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.000809 754382 task_exit.go:204] [ 1202: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.000848 754382 task_signals.go:204] [ 1202: 1203] Signal 1202, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.000865 754382 task_exit.go:204] [ 1202: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.000873 754382 task_exit.go:204] [ 1202: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.000889 754382 task_exit.go:204] [ 1202: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.000918 754382 task_exit.go:204] [ 1202: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.000923 754382 task_exit.go:204] [ 1202: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.000930 754382 task_exit.go:204] [ 1202: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.000935 754382 task_exit.go:204] [ 1202: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.000982 754382 task_exit.go:204] [ 1202: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.001000 754382 task_exit.go:204] [ 1202: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.002524 754382 task_exit.go:204] [ 1202: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.002548 754382 task_exit.go:204] [ 1202: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.002560 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:01.002581 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.002591 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:01.002813 754382 task_exit.go:204] [ 1202: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.003463 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.005346 754382 syscalls.go:262] [ 1207: 1207] Allocating stack with size of 8388608 bytes D0712 23:59:01.005507 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.008778 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.008861 754382 usertrap_amd64.go:106] [ 1207: 1207] Map a usertrap vma at 69000 D0712 23:59:01.009053 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 1 D0712 23:59:01.009092 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:59:01.009741 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.009786 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 2 D0712 23:59:01.009806 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:59:01.010678 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.010740 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 3 D0712 23:59:01.010757 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:59:01.018513 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.018548 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 4 D0712 23:59:01.018565 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:59:01.019737 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.019778 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 5 D0712 23:59:01.019796 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:59:01.019852 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.019878 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 6 D0712 23:59:01.019887 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:59:01.020342 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.020371 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 7 D0712 23:59:01.020382 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:59:01.020682 754382 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.020716 754382 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc0005fb3b0 8 D0712 23:59:01.020737 754382 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:59:01.020864 754382 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.020978 754382 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc0005fb3b0 9 D0712 23:59:01.020993 754382 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:59:01.021170 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.021201 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 10 D0712 23:59:01.021212 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:59:01.030424 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.030457 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 11 D0712 23:59:01.030471 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:59:01.031395 754382 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.031419 754382 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc0005fb3b0 12 D0712 23:59:01.031429 754382 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:59:01.031477 754382 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.031482 754382 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc0005fb3b0 13 D0712 23:59:01.031487 754382 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:59:01.031501 754382 task_signals.go:470] [ 1207: 1207] Notified of signal 23 D0712 23:59:01.031580 754382 task_signals.go:220] [ 1207: 1207] Signal 23: delivering to handler D0712 23:59:01.031779 754382 task_signals.go:481] [ 1207: 1207] No task notified of signal 23 D0712 23:59:01.031828 754382 task_signals.go:220] [ 1207: 1207] Signal 23: delivering to handler D0712 23:59:01.042342 754382 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.042383 754382 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc0005fb3b0 14 D0712 23:59:01.042399 754382 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:59:01.042462 754382 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.042488 754382 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.042515 754382 task_signals.go:204] [ 1207: 1210] Signal 1207, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.042515 754382 task_signals.go:204] [ 1207: 1209] Signal 1207, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.042530 754382 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.042579 754382 task_signals.go:204] [ 1207: 1208] Signal 1207, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.042618 754382 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.042628 754382 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.042666 754382 task_signals.go:204] [ 1207: 1211] Signal 1207, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.042682 754382 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.042743 754382 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.042753 754382 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.042816 754382 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.042904 754382 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.042914 754382 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.042941 754382 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.044618 754382 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.044690 754382 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.044710 754382 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 23:59:01.044746 754382 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.044773 754382 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 23:59:01.045063 754382 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.045917 754382 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.047672 754382 syscalls.go:262] [ 1212: 1212] Allocating stack with size of 8388608 bytes D0712 23:59:01.047838 754382 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.049366 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.049421 754382 usertrap_amd64.go:106] [ 1212: 1212] Map a usertrap vma at 69000 D0712 23:59:01.049608 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 1 D0712 23:59:01.049651 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:59:01.050646 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.050690 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 2 D0712 23:59:01.050705 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:59:01.051959 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.051993 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 3 D0712 23:59:01.052018 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:59:01.059017 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.059052 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 4 D0712 23:59:01.059068 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:59:01.060303 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.060332 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 5 D0712 23:59:01.060348 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:59:01.060405 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.060422 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 6 D0712 23:59:01.060431 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:59:01.060692 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.060716 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 7 D0712 23:59:01.060726 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:59:01.060883 754382 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.060908 754382 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00087f440 8 D0712 23:59:01.060917 754382 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:59:01.061049 754382 usertrap_amd64.go:212] [ 1212: 1214] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.061074 754382 usertrap_amd64.go:122] [ 1212: 1214] Allocate a new trap: 0xc00087f440 9 D0712 23:59:01.061082 754382 usertrap_amd64.go:225] [ 1212: 1214] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:59:01.061189 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.061212 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 10 D0712 23:59:01.061222 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:59:01.069440 754382 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.069481 754382 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00087f440 11 D0712 23:59:01.069501 754382 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:59:01.072088 754382 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.072124 754382 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00087f440 12 D0712 23:59:01.072139 754382 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:59:01.072438 754382 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.072471 754382 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00087f440 13 D0712 23:59:01.072483 754382 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:59:01.072573 754382 task_signals.go:470] [ 1212: 1212] Notified of signal 23 D0712 23:59:01.072717 754382 task_signals.go:220] [ 1212: 1212] Signal 23: delivering to handler D0712 23:59:01.081880 754382 task_signals.go:309] [ 1212: 1212] failed to restore from a signal frame: bad address D0712 23:59:01.081964 754382 task_signals.go:470] [ 1212: 1212] Notified of signal 11 D0712 23:59:01.081998 754382 task_signals.go:220] [ 1212: 1212] Signal 11: delivering to handler W0712 23:59:01.117733 754485 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF W0712 23:59:01.117892 754485 main.go:274] Failure to execute command, err: 1 W0712 23:59:01.132285 754359 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0712 23:59:01.132276 1 connection.go:127] sock read failed, closing connection: EOF I0712 23:59:01.132422 1 gofer.go:319] All lisafs servers exited. I0712 23:59:01.132451 1 main.go:265] Exiting with status: 0 D0712 23:59:01.136280 754359 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-0 D0712 23:59:01.136376 754359 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-0 D0712 23:59:01.136383 754359 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-0 D0712 23:59:01.136398 754359 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-0" D0712 23:59:01.136475 754359 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-0, PID: 754372 D0712 23:59:01.142886 754359 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-0" D0712 23:59:01.142951 754359 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143082 754359 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143119 754359 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143140 754359 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143166 754359 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143189 754359 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143197 754359 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143206 754359 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143213 754359 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143252 754359 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143280 754359 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143292 754359 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-0" D0712 23:59:01.143305 754359 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-0" I0712 23:59:01.144044 754359 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0712 23:59:01.173541 754800 main.go:230] *************************** I0712 23:59:01.173608 754800 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0712 23:59:01.173649 754800 main.go:232] Version 0.0.0 I0712 23:59:01.173683 754800 main.go:233] GOOS: linux I0712 23:59:01.173702 754800 main.go:234] GOARCH: amd64 I0712 23:59:01.173732 754800 main.go:235] PID: 754800 I0712 23:59:01.173762 754800 main.go:236] UID: 0, GID: 0 I0712 23:59:01.173790 754800 main.go:237] Configuration: I0712 23:59:01.173808 754800 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 23:59:01.173828 754800 main.go:239] Platform: systrap I0712 23:59:01.173851 754800 main.go:240] FileAccess: shared I0712 23:59:01.173885 754800 main.go:241] Directfs: true I0712 23:59:01.173904 754800 main.go:242] Overlay: none I0712 23:59:01.173927 754800 main.go:243] Network: sandbox, logging: false I0712 23:59:01.173957 754800 main.go:244] Strace: false, max size: 1024, syscalls: I0712 23:59:01.173980 754800 main.go:245] IOURING: false I0712 23:59:01.174013 754800 main.go:246] Debug: true I0712 23:59:01.174043 754800 main.go:247] Systemd: false I0712 23:59:01.174069 754800 main.go:248] *************************** D0712 23:59:01.174120 754800 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 23:59:01.174287 754800 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": file does not exist loading container "ci-gvisor-systrap-1-test-0": file does not exist W0712 23:59:01.174390 754800 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-0"]: exit status 128 I0712 23:59:01.173541 754800 main.go:230] *************************** I0712 23:59:01.173608 754800 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0712 23:59:01.173649 754800 main.go:232] Version 0.0.0 I0712 23:59:01.173683 754800 main.go:233] GOOS: linux I0712 23:59:01.173702 754800 main.go:234] GOARCH: amd64 I0712 23:59:01.173732 754800 main.go:235] PID: 754800 I0712 23:59:01.173762 754800 main.go:236] UID: 0, GID: 0 I0712 23:59:01.173790 754800 main.go:237] Configuration: I0712 23:59:01.173808 754800 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 23:59:01.173828 754800 main.go:239] Platform: systrap I0712 23:59:01.173851 754800 main.go:240] FileAccess: shared I0712 23:59:01.173885 754800 main.go:241] Directfs: true I0712 23:59:01.173904 754800 main.go:242] Overlay: none I0712 23:59:01.173927 754800 main.go:243] Network: sandbox, logging: false I0712 23:59:01.173957 754800 main.go:244] Strace: false, max size: 1024, syscalls: I0712 23:59:01.173980 754800 main.go:245] IOURING: false I0712 23:59:01.174013 754800 main.go:246] Debug: true I0712 23:59:01.174043 754800 main.go:247] Systemd: false I0712 23:59:01.174069 754800 main.go:248] *************************** D0712 23:59:01.174120 754800 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 23:59:01.174287 754800 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": file does not exist loading container "ci-gvisor-systrap-1-test-0": file does not exist W0712 23:59:01.174390 754800 main.go:274] Failure to execute command, err: 1 [11530654.559543] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.371355] warn_bad_vsyscall: 277 callbacks suppressed [11530659.371358] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.693220] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.085260] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.158793] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.193093] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f7e858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2