49 usertrap_amd64.go:212] [ 587: 587] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.751624 786749 usertrap_amd64.go:122] [ 587: 587] Allocate a new trap: 0xc0013415f0 10 D0713 00:07:56.751636 786749 usertrap_amd64.go:225] [ 587: 587] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:56.751780 786749 usertrap_amd64.go:212] [ 587: 587] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:56.751798 786749 usertrap_amd64.go:122] [ 587: 587] Allocate a new trap: 0xc0013415f0 11 D0713 00:07:56.751811 786749 usertrap_amd64.go:225] [ 587: 587] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:56.761692 786749 usertrap_amd64.go:212] [ 587: 587] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.761734 786749 usertrap_amd64.go:122] [ 587: 587] Allocate a new trap: 0xc0013415f0 12 D0713 00:07:56.761750 786749 usertrap_amd64.go:225] [ 587: 587] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:56.764325 786749 usertrap_amd64.go:212] [ 587: 588] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.764360 786749 usertrap_amd64.go:122] [ 587: 588] Allocate a new trap: 0xc0013415f0 13 D0713 00:07:56.764374 786749 usertrap_amd64.go:225] [ 587: 588] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:56.764416 786749 usertrap_amd64.go:212] [ 587: 588] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.764494 786749 usertrap_amd64.go:122] [ 587: 588] Allocate a new trap: 0xc0013415f0 14 D0713 00:07:56.764530 786749 usertrap_amd64.go:225] [ 587: 588] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:56.764605 786749 task_signals.go:470] [ 587: 587] Notified of signal 23 D0713 00:07:56.764719 786749 task_signals.go:220] [ 587: 587] Signal 23: delivering to handler D0713 00:07:56.773000 786749 usertrap_amd64.go:212] [ 587: 587] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.773036 786749 usertrap_amd64.go:122] [ 587: 587] Allocate a new trap: 0xc0013415f0 15 D0713 00:07:56.773052 786749 usertrap_amd64.go:225] [ 587: 587] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:07:56.773102 786749 task_exit.go:204] [ 587: 587] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.773137 786749 task_exit.go:204] [ 587: 587] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.773170 786749 task_signals.go:204] [ 587: 588] Signal 587, PID: 588, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.773195 786749 task_exit.go:204] [ 587: 588] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.773204 786749 task_exit.go:204] [ 587: 588] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.773210 786749 task_exit.go:204] [ 587: 588] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.773231 786749 task_signals.go:204] [ 587: 589] Signal 587, PID: 589, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.773241 786749 task_exit.go:204] [ 587: 589] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.773267 786749 task_exit.go:204] [ 587: 589] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.773275 786749 task_exit.go:204] [ 587: 589] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.773295 786749 task_signals.go:204] [ 587: 590] Signal 587, PID: 590, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.773317 786749 task_exit.go:204] [ 587: 590] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.773325 786749 task_exit.go:204] [ 587: 590] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.773332 786749 task_exit.go:204] [ 587: 590] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.773345 786749 task_signals.go:204] [ 587: 591] Signal 587, PID: 591, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.773356 786749 task_exit.go:204] [ 587: 591] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.774796 786749 task_exit.go:204] [ 587: 591] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.774856 786749 task_exit.go:204] [ 587: 591] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.774871 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.774959 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:56.774969 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.775133 786749 task_exit.go:204] [ 587: 587] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.775875 786749 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.777368 786749 syscalls.go:262] [ 592: 592] Allocating stack with size of 8388608 bytes D0713 00:07:56.777500 786749 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.778672 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:56.778770 786749 usertrap_amd64.go:106] [ 592: 592] Map a usertrap vma at 65000 D0713 00:07:56.778943 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 1 D0713 00:07:56.779004 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:56.779491 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:56.779516 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 2 D0713 00:07:56.779535 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:56.780368 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:56.780398 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 3 D0713 00:07:56.780409 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:56.790875 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:56.790940 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 4 D0713 00:07:56.790960 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:56.792876 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:56.792934 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 5 D0713 00:07:56.792996 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:56.793044 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b214:sysno 13 D0713 00:07:56.793067 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 6 D0713 00:07:56.793075 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:56.793535 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:56.793585 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 7 D0713 00:07:56.793602 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:56.794002 786749 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:56.794018 786749 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc001b3e450 8 D0713 00:07:56.794055 786749 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:56.794288 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.794317 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 9 D0713 00:07:56.794328 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:56.794342 786749 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46af76:sysno 35 D0713 00:07:56.794348 786749 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc001b3e450 10 D0713 00:07:56.794358 786749 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:56.803168 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.803212 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 11 D0713 00:07:56.803234 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:56.806053 786749 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.806085 786749 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc001b3e450 12 D0713 00:07:56.806099 786749 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:56.806150 786749 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.806167 786749 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc001b3e450 13 D0713 00:07:56.806174 786749 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:56.806197 786749 task_signals.go:470] [ 592: 592] Notified of signal 23 D0713 00:07:56.806292 786749 task_signals.go:220] [ 592: 592] Signal 23: delivering to handler D0713 00:07:56.814835 786749 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.814896 786749 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc001b3e450 14 D0713 00:07:56.814917 786749 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:56.815003 786749 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.815046 786749 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.815082 786749 task_signals.go:204] [ 592: 595] Signal 592, PID: 595, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.815087 786749 task_signals.go:204] [ 592: 594] Signal 592, PID: 594, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.815103 786749 task_signals.go:204] [ 592: 596] Signal 592, PID: 596, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.815107 786749 task_exit.go:204] [ 592: 595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.815138 786749 task_exit.go:204] [ 592: 595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.815168 786749 task_exit.go:204] [ 592: 595] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.815186 786749 task_exit.go:204] [ 592: 594] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.815199 786749 task_signals.go:204] [ 592: 593] Signal 592, PID: 593, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.815218 786749 task_exit.go:204] [ 592: 594] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.815242 786749 task_exit.go:204] [ 592: 594] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.815256 786749 task_exit.go:204] [ 592: 596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.815276 786749 task_exit.go:204] [ 592: 596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.815283 786749 task_exit.go:204] [ 592: 596] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.815296 786749 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.816853 786749 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.816894 786749 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.816916 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.817023 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:56.817043 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.817206 786749 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.819025 786749 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.820927 786749 syscalls.go:262] [ 597: 597] Allocating stack with size of 8388608 bytes D0713 00:07:56.821179 786749 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.822268 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:56.822341 786749 usertrap_amd64.go:106] [ 597: 597] Map a usertrap vma at 64000 D0713 00:07:56.822475 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 1 D0713 00:07:56.822509 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:56.822857 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:56.822873 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 2 D0713 00:07:56.822885 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:56.823594 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:56.823614 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 3 D0713 00:07:56.823624 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:56.830203 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:56.830242 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 4 D0713 00:07:56.830257 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:56.831272 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:56.831315 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 5 D0713 00:07:56.831333 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:56.831371 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b214:sysno 13 D0713 00:07:56.831376 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 6 D0713 00:07:56.831381 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:56.831815 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:56.831844 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 7 D0713 00:07:56.831859 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:56.832043 786749 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:56.832069 786749 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc001ba80c0 8 D0713 00:07:56.832080 786749 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:56.832270 786749 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46af76:sysno 35 D0713 00:07:56.832298 786749 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc001ba80c0 9 D0713 00:07:56.832311 786749 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:56.832327 786749 usertrap_amd64.go:212] [ 597: 599] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:56.832334 786749 usertrap_amd64.go:122] [ 597: 599] Allocate a new trap: 0xc001ba80c0 10 D0713 00:07:56.832342 786749 usertrap_amd64.go:225] [ 597: 599] Apply the binary patch addr 46b6e0 trap addr 64320 ([184 24 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:56.832368 786749 usertrap_amd64.go:212] [ 597: 599] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.832389 786749 usertrap_amd64.go:122] [ 597: 599] Allocate a new trap: 0xc001ba80c0 11 D0713 00:07:56.832399 786749 usertrap_amd64.go:225] [ 597: 599] Apply the binary patch addr 46b57c trap addr 64370 ([184 202 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:56.840277 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.840312 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 12 D0713 00:07:56.840326 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:56.842852 786749 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.842873 786749 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc001ba80c0 13 D0713 00:07:56.842886 786749 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:56.842958 786749 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.842968 786749 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc001ba80c0 14 D0713 00:07:56.842975 786749 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:56.843010 786749 task_signals.go:470] [ 597: 597] Notified of signal 23 D0713 00:07:56.843095 786749 task_signals.go:220] [ 597: 597] Signal 23: delivering to handler I0713 00:07:56.850298 786749 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 00:07:56.850412 786749 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.850450 786749 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc001ba80c0 15 D0713 00:07:56.850465 786749 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 00:07:56.850528 786749 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.850558 786749 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.850580 786749 task_signals.go:204] [ 597: 600] Signal 597, PID: 600, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.850584 786749 task_signals.go:204] [ 597: 601] Signal 597, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.850606 786749 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.850612 786749 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.850617 786749 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.850573 786749 task_signals.go:204] [ 597: 599] Signal 597, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.850613 786749 task_signals.go:204] [ 597: 598] Signal 597, PID: 598, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.850632 786749 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.850663 786749 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.850700 786749 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.850720 786749 task_exit.go:204] [ 597: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.850750 786749 task_exit.go:204] [ 597: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.850760 786749 task_exit.go:204] [ 597: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.850772 786749 task_exit.go:204] [ 597: 598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.852130 786749 task_exit.go:204] [ 597: 598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.852155 786749 task_exit.go:204] [ 597: 598] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.852173 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.852200 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:56.852207 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.852343 786749 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.853056 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.854413 786749 syscalls.go:262] [ 602: 602] Allocating stack with size of 8388608 bytes D0713 00:07:56.854552 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.855727 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:56.855764 786749 usertrap_amd64.go:106] [ 602: 602] Map a usertrap vma at 67000 D0713 00:07:56.855901 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 1 D0713 00:07:56.855947 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:56.856339 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:56.856365 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 2 D0713 00:07:56.856377 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:56.857031 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:56.857060 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 3 D0713 00:07:56.857072 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:56.863661 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:56.863686 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 4 D0713 00:07:56.863699 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:56.864716 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:56.864739 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 5 D0713 00:07:56.864749 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:56.864799 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b214:sysno 13 D0713 00:07:56.864804 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 6 D0713 00:07:56.864809 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:56.865043 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:56.865063 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 7 D0713 00:07:56.865069 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:56.865201 786749 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:56.865223 786749 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc001c9a990 8 D0713 00:07:56.865231 786749 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:56.865371 786749 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46af76:sysno 35 D0713 00:07:56.865404 786749 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc001c9a990 9 D0713 00:07:56.865420 786749 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:56.865503 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.865526 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 10 D0713 00:07:56.865536 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:56.865934 786749 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.865960 786749 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc001c9a990 11 D0713 00:07:56.865973 786749 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:56.866047 786749 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.866072 786749 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc001c9a990 12 D0713 00:07:56.866085 786749 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:56.866150 786749 task_signals.go:470] [ 602: 602] Notified of signal 23 D0713 00:07:56.866237 786749 task_signals.go:220] [ 602: 602] Signal 23: delivering to handler D0713 00:07:56.872601 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.872637 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 13 D0713 00:07:56.872651 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:56.876980 786749 task_signals.go:470] [ 602: 602] Notified of signal 23 D0713 00:07:56.877028 786749 task_signals.go:220] [ 602: 602] Signal 23: delivering to handler I0713 00:07:56.882995 786749 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 00:07:56.883091 786749 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.883103 786749 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc001c9a990 14 D0713 00:07:56.883114 786749 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:56.883141 786749 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.883178 786749 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.883179 786749 task_signals.go:204] [ 602: 604] Signal 602, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.883210 786749 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.883207 786749 task_signals.go:204] [ 602: 605] Signal 602, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.883224 786749 task_signals.go:204] [ 602: 603] Signal 602, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.883241 786749 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.883260 786749 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.883281 786749 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.883304 786749 task_signals.go:204] [ 602: 606] Signal 602, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.883318 786749 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.883325 786749 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.883335 786749 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.883362 786749 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.883377 786749 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.883388 786749 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.884647 786749 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.884675 786749 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.884686 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.884713 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:56.884720 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.884828 786749 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.885425 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.886773 786749 syscalls.go:262] [ 607: 607] Allocating stack with size of 8388608 bytes D0713 00:07:56.886890 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.887916 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:56.887955 786749 usertrap_amd64.go:106] [ 607: 607] Map a usertrap vma at 68000 D0713 00:07:56.888036 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 1 D0713 00:07:56.888077 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:56.888888 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:56.888916 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 2 D0713 00:07:56.888932 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:56.889895 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:56.889924 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 3 D0713 00:07:56.889933 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:56.896163 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:56.896189 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 4 D0713 00:07:56.896198 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:56.897497 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:56.897531 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 5 D0713 00:07:56.897544 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:56.897601 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b214:sysno 13 D0713 00:07:56.897617 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 6 D0713 00:07:56.897623 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:56.897969 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:56.897994 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 7 D0713 00:07:56.898001 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:56.898171 786749 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:56.898198 786749 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001c9ae10 8 D0713 00:07:56.898210 786749 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:56.898410 786749 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46af76:sysno 35 D0713 00:07:56.898458 786749 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001c9ae10 9 D0713 00:07:56.898498 786749 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:56.898568 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.898589 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 10 D0713 00:07:56.898597 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:56.906062 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.906090 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 11 D0713 00:07:56.906100 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:56.908765 786749 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.908800 786749 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001c9ae10 12 D0713 00:07:56.908815 786749 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:56.908889 786749 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.908918 786749 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001c9ae10 13 D0713 00:07:56.908929 786749 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:56.909888 786749 task_signals.go:470] [ 607: 607] Notified of signal 23 D0713 00:07:56.909948 786749 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler I0713 00:07:56.916491 786749 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 00:07:56.916562 786749 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.916570 786749 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001c9ae10 14 D0713 00:07:56.916582 786749 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:56.916623 786749 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.916660 786749 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.916688 786749 task_signals.go:204] [ 607: 609] Signal 607, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.916724 786749 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.916701 786749 task_signals.go:204] [ 607: 610] Signal 607, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.916739 786749 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.916746 786749 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.916766 786749 task_signals.go:204] [ 607: 611] Signal 607, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.916794 786749 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.916805 786749 task_signals.go:204] [ 607: 608] Signal 607, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.916822 786749 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.916829 786749 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.916841 786749 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.916849 786749 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.916856 786749 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.916867 786749 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.918152 786749 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.918179 786749 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.918190 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.918222 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.918324 786749 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.918906 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.920306 786749 syscalls.go:262] [ 612: 612] Allocating stack with size of 8388608 bytes D0713 00:07:56.920409 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.921200 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:56.921240 786749 usertrap_amd64.go:106] [ 612: 612] Map a usertrap vma at 69000 D0713 00:07:56.921388 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 1 D0713 00:07:56.921427 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:56.921668 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:56.921689 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 2 D0713 00:07:56.921699 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:56.922160 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:56.922178 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 3 D0713 00:07:56.922187 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:56.929385 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:56.929436 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 4 D0713 00:07:56.929453 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:56.930713 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:56.930732 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 5 D0713 00:07:56.930746 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:56.930869 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b214:sysno 13 D0713 00:07:56.930905 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 6 D0713 00:07:56.930917 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:56.931354 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:56.931392 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 7 D0713 00:07:56.931404 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:56.931655 786749 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:56.931679 786749 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc001c9b170 8 D0713 00:07:56.931691 786749 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:56.931903 786749 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46af76:sysno 35 D0713 00:07:56.931936 786749 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc001c9b170 9 D0713 00:07:56.931946 786749 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:56.932011 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.932035 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 10 D0713 00:07:56.932044 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:56.939864 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.939905 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 11 D0713 00:07:56.939919 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:56.942710 786749 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.942739 786749 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc001c9b170 12 D0713 00:07:56.942751 786749 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:56.942781 786749 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.942818 786749 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc001c9b170 13 D0713 00:07:56.942827 786749 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:56.942885 786749 task_signals.go:470] [ 612: 612] Notified of signal 23 D0713 00:07:56.942934 786749 task_signals.go:220] [ 612: 612] Signal 23: delivering to handler I0713 00:07:56.950760 786749 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 00:07:56.950880 786749 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.950903 786749 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc001c9b170 14 D0713 00:07:56.950914 786749 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:56.950993 786749 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.951033 786749 task_signals.go:204] [ 612: 614] Signal 612, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.951031 786749 task_signals.go:204] [ 612: 613] Signal 612, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.951062 786749 task_signals.go:204] [ 612: 616] Signal 612, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.951088 786749 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.951101 786749 task_signals.go:204] [ 612: 615] Signal 612, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.951124 786749 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.951134 786749 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.951142 786749 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.951152 786749 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.951188 786749 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.951210 786749 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.951224 786749 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.951232 786749 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.951244 786749 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.951275 786749 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.952661 786749 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.952682 786749 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.952695 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.952717 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:56.952724 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.952831 786749 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.958210 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.959784 786749 syscalls.go:262] [ 617: 617] Allocating stack with size of 8388608 bytes D0713 00:07:56.959976 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.963602 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:56.963657 786749 usertrap_amd64.go:106] [ 617: 617] Map a usertrap vma at 65000 D0713 00:07:56.963777 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 1 D0713 00:07:56.963824 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:56.964131 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:56.964157 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 2 D0713 00:07:56.964167 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:56.964875 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:56.964905 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 3 D0713 00:07:56.964916 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:56.971177 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:56.971240 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 4 D0713 00:07:56.971256 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:56.972427 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:56.972459 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 5 D0713 00:07:56.972479 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:56.972525 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b214:sysno 13 D0713 00:07:56.972540 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 6 D0713 00:07:56.972549 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:56.972738 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:56.972758 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 7 D0713 00:07:56.972767 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:56.973063 786749 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:56.973087 786749 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc001564030 8 D0713 00:07:56.973097 786749 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:56.973487 786749 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46af76:sysno 35 D0713 00:07:56.973504 786749 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc001564030 9 D0713 00:07:56.973516 786749 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:56.973631 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:56.973654 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 10 D0713 00:07:56.973664 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:56.981733 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46af29:sysno 293 D0713 00:07:56.981762 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 11 D0713 00:07:56.981774 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:56.984899 786749 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b020:sysno 39 D0713 00:07:56.984971 786749 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc001564030 12 D0713 00:07:56.985028 786749 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:56.985740 786749 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:56.985774 786749 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc001564030 13 D0713 00:07:56.985788 786749 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:56.985883 786749 task_signals.go:470] [ 617: 617] Notified of signal 23 D0713 00:07:56.986610 786749 task_signals.go:220] [ 617: 617] Signal 23: delivering to handler I0713 00:07:56.994399 786749 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 00:07:56.994499 786749 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:56.994512 786749 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc001564030 14 D0713 00:07:56.994528 786749 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:56.994598 786749 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.994629 786749 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.994654 786749 task_signals.go:204] [ 617: 622] Signal 617, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.994679 786749 task_exit.go:204] [ 617: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.994672 786749 task_signals.go:204] [ 617: 619] Signal 617, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.994688 786749 task_exit.go:204] [ 617: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.994651 786749 task_signals.go:204] [ 617: 621] Signal 617, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.994694 786749 task_exit.go:204] [ 617: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.994651 786749 task_signals.go:204] [ 617: 620] Signal 617, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.994708 786749 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.994717 786749 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.994738 786749 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.994746 786749 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.994760 786749 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.994766 786749 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.994775 786749 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.994791 786749 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.994804 786749 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.994852 786749 task_signals.go:204] [ 617: 618] Signal 617, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:56.994873 786749 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:56.996268 786749 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:56.996299 786749 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.996313 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:56.996342 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:56.996350 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:56.996452 786749 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:56.997345 786749 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:56.998819 786749 syscalls.go:262] [ 623: 623] Allocating stack with size of 8388608 bytes D0713 00:07:56.999144 786749 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.000122 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.000160 786749 usertrap_amd64.go:106] [ 623: 623] Map a usertrap vma at 64000 D0713 00:07:57.000216 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 1 D0713 00:07:57.000243 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:57.000759 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.000840 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 2 D0713 00:07:57.000854 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:57.001537 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.001578 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 3 D0713 00:07:57.001600 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:57.013163 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.013259 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 4 D0713 00:07:57.013280 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:57.014459 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.014487 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 5 D0713 00:07:57.014497 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:57.014545 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.014551 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 6 D0713 00:07:57.014559 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:57.014848 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.014873 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 7 D0713 00:07:57.014882 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:57.015113 786749 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.015138 786749 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001b3e270 8 D0713 00:07:57.015148 786749 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:57.015434 786749 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.015482 786749 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001b3e270 9 D0713 00:07:57.015501 786749 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:57.015629 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.015676 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 10 D0713 00:07:57.015692 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:57.023884 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.023926 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 11 D0713 00:07:57.023940 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:57.027818 786749 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.027859 786749 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001b3e270 12 D0713 00:07:57.027878 786749 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:57.028131 786749 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.028175 786749 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001b3e270 13 D0713 00:07:57.028201 786749 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:57.028321 786749 task_signals.go:470] [ 623: 623] Notified of signal 23 D0713 00:07:57.028426 786749 task_signals.go:220] [ 623: 623] Signal 23: delivering to handler I0713 00:07:57.036566 786749 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 00:07:57.036761 786749 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.036800 786749 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001b3e270 14 D0713 00:07:57.036814 786749 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:57.036862 786749 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.036898 786749 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.036964 786749 task_signals.go:204] [ 623: 626] Signal 623, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.036992 786749 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.037001 786749 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.036993 786749 task_signals.go:204] [ 623: 624] Signal 623, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.037007 786749 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.036987 786749 task_signals.go:204] [ 623: 625] Signal 623, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.037051 786749 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.037078 786749 task_signals.go:204] [ 623: 627] Signal 623, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.037094 786749 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.037100 786749 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.037113 786749 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.037121 786749 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.037127 786749 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.037136 786749 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.038573 786749 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.038615 786749 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.038629 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.038654 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.038662 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.038770 786749 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.039313 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.040759 786749 syscalls.go:262] [ 628: 628] Allocating stack with size of 8388608 bytes D0713 00:07:57.040873 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.043630 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.043670 786749 usertrap_amd64.go:106] [ 628: 628] Map a usertrap vma at 66000 D0713 00:07:57.043734 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 1 D0713 00:07:57.043756 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:57.044216 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.044289 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 2 D0713 00:07:57.044316 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:57.045731 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.045762 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 3 D0713 00:07:57.045775 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:57.052566 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.052601 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 4 D0713 00:07:57.052616 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:57.053777 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.053805 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 5 D0713 00:07:57.053815 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:57.053854 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.053860 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 6 D0713 00:07:57.053866 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:57.054171 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.054199 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 7 D0713 00:07:57.054209 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:57.054388 786749 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.054414 786749 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001564660 8 D0713 00:07:57.054424 786749 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:57.054617 786749 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.054641 786749 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001564660 9 D0713 00:07:57.054651 786749 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:57.054710 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.054721 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 10 D0713 00:07:57.054730 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:57.054817 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.054841 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 11 D0713 00:07:57.054851 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:57.063058 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.063092 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 12 D0713 00:07:57.063105 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:57.065892 786749 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.065929 786749 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001564660 13 D0713 00:07:57.065945 786749 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:57.067553 786749 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.067617 786749 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001564660 14 D0713 00:07:57.067632 786749 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:57.067693 786749 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 00:07:57.067781 786749 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler D0713 00:07:57.074026 786749 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.074066 786749 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001564660 15 D0713 00:07:57.074081 786749 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:07:57.074150 786749 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.074201 786749 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.074206 786749 task_signals.go:204] [ 628: 632] Signal 628, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.074221 786749 task_signals.go:204] [ 628: 630] Signal 628, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.074228 786749 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.074261 786749 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.074267 786749 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.074282 786749 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.074288 786749 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.074293 786749 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.074306 786749 task_signals.go:204] [ 628: 631] Signal 628, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.074316 786749 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.074324 786749 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.074329 786749 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.074340 786749 task_signals.go:204] [ 628: 629] Signal 628, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.074359 786749 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.075719 786749 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.075742 786749 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.075764 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.075798 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.075907 786749 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.075993 786749 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:57.076019 786749 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:57.076481 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.078045 786749 syscalls.go:262] [ 633: 633] Allocating stack with size of 8388608 bytes D0713 00:07:57.078142 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.079452 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.079492 786749 usertrap_amd64.go:106] [ 633: 633] Map a usertrap vma at 69000 D0713 00:07:57.079567 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 1 D0713 00:07:57.079586 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.080046 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.080069 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 2 D0713 00:07:57.080078 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.080643 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.080679 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 3 D0713 00:07:57.080687 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.086668 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.086749 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 4 D0713 00:07:57.086770 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.088151 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.088197 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 5 D0713 00:07:57.088212 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.088273 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.088294 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 6 D0713 00:07:57.088303 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.088686 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.088713 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 7 D0713 00:07:57.088723 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.088889 786749 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.088990 786749 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc001a9a8a0 8 D0713 00:07:57.089045 786749 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.089251 786749 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.089272 786749 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc001a9a8a0 9 D0713 00:07:57.089281 786749 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.089337 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.089365 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 10 D0713 00:07:57.089378 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.097519 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.097546 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 11 D0713 00:07:57.097555 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.100008 786749 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.100048 786749 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc001a9a8a0 12 D0713 00:07:57.100063 786749 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.100134 786749 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.100145 786749 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc001a9a8a0 13 D0713 00:07:57.100154 786749 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.100172 786749 task_signals.go:470] [ 633: 633] Notified of signal 23 D0713 00:07:57.100236 786749 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler I0713 00:07:57.108497 786749 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 00:07:57.108650 786749 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.108665 786749 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc001a9a8a0 14 D0713 00:07:57.108682 786749 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.108738 786749 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.108764 786749 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.108784 786749 task_signals.go:204] [ 633: 634] Signal 633, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.108794 786749 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.108801 786749 task_signals.go:204] [ 633: 636] Signal 633, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.108818 786749 task_signals.go:204] [ 633: 635] Signal 633, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.108843 786749 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.108850 786749 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.108864 786749 task_signals.go:204] [ 633: 637] Signal 633, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.108885 786749 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.108894 786749 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.108899 786749 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.108910 786749 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.108915 786749 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.108921 786749 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.108930 786749 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.110426 786749 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.110456 786749 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.110467 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.110495 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.110504 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.110642 786749 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.111471 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.113014 786749 syscalls.go:262] [ 638: 638] Allocating stack with size of 8388608 bytes D0713 00:07:57.113144 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.116216 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.116278 786749 usertrap_amd64.go:106] [ 638: 638] Map a usertrap vma at 62000 D0713 00:07:57.116437 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 1 D0713 00:07:57.116479 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:57.116980 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.117018 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 2 D0713 00:07:57.117032 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:57.117729 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.117761 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 3 D0713 00:07:57.117772 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:57.124571 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.124599 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 4 D0713 00:07:57.124610 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:57.125892 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.125925 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 5 D0713 00:07:57.125948 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:57.126016 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.126022 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 6 D0713 00:07:57.126028 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:57.126380 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.126402 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 7 D0713 00:07:57.126412 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:57.126729 786749 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.126742 786749 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001a9aa50 8 D0713 00:07:57.126753 786749 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:57.126902 786749 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.126923 786749 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001a9aa50 9 D0713 00:07:57.126929 786749 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:57.127106 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.127126 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 10 D0713 00:07:57.127137 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:57.134289 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.134314 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 11 D0713 00:07:57.134327 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:57.138341 786749 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.138420 786749 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001a9aa50 12 D0713 00:07:57.138467 786749 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:57.139381 786749 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.139406 786749 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001a9aa50 13 D0713 00:07:57.139414 786749 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:57.139486 786749 task_signals.go:470] [ 638: 638] Notified of signal 23 D0713 00:07:57.139572 786749 task_signals.go:220] [ 638: 638] Signal 23: delivering to handler I0713 00:07:57.145301 786749 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 00:07:57.145388 786749 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.145405 786749 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001a9aa50 14 D0713 00:07:57.145414 786749 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:57.146412 786749 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.146511 786749 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.146565 786749 task_signals.go:204] [ 638: 642] Signal 638, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.146569 786749 task_signals.go:204] [ 638: 640] Signal 638, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.146583 786749 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.146609 786749 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.146623 786749 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.146679 786749 task_signals.go:204] [ 638: 639] Signal 638, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.146707 786749 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.146732 786749 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.146739 786749 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.146751 786749 task_signals.go:204] [ 638: 641] Signal 638, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.146773 786749 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.146793 786749 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.146798 786749 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.146809 786749 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.148332 786749 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.148435 786749 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.148467 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.148530 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.148558 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.148629 786749 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.149446 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.150839 786749 syscalls.go:262] [ 643: 643] Allocating stack with size of 8388608 bytes D0713 00:07:57.150925 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.153606 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.153695 786749 usertrap_amd64.go:106] [ 643: 643] Map a usertrap vma at 60000 D0713 00:07:57.153807 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 1 D0713 00:07:57.153834 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.154191 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.154212 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 2 D0713 00:07:57.154221 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.154889 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.154932 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 3 D0713 00:07:57.154952 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.161416 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.161562 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 4 D0713 00:07:57.161590 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.162748 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.162778 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 5 D0713 00:07:57.162793 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.162840 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.162859 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 6 D0713 00:07:57.162866 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.163095 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.163119 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 7 D0713 00:07:57.163127 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.163309 786749 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.163330 786749 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001a9afc0 8 D0713 00:07:57.163340 786749 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.163526 786749 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.163558 786749 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001a9afc0 9 D0713 00:07:57.163571 786749 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.163726 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.163758 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 10 D0713 00:07:57.163771 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.172674 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.172710 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 11 D0713 00:07:57.172722 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.175357 786749 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.175391 786749 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001a9afc0 12 D0713 00:07:57.175406 786749 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.175475 786749 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.175499 786749 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001a9afc0 13 D0713 00:07:57.175509 786749 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.175565 786749 task_signals.go:470] [ 643: 643] Notified of signal 23 D0713 00:07:57.175641 786749 task_signals.go:220] [ 643: 643] Signal 23: delivering to handler I0713 00:07:57.184189 786749 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 00:07:57.184337 786749 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.184353 786749 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001a9afc0 14 D0713 00:07:57.184370 786749 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.184449 786749 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.184491 786749 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.184522 786749 task_signals.go:204] [ 643: 644] Signal 643, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.184538 786749 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.184548 786749 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.184555 786749 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.184617 786749 task_signals.go:204] [ 643: 645] Signal 643, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.184637 786749 task_signals.go:204] [ 643: 647] Signal 643, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.184667 786749 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.184710 786749 task_signals.go:204] [ 643: 646] Signal 643, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.184744 786749 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.184767 786749 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.184786 786749 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.184828 786749 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.184837 786749 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.184852 786749 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.186602 786749 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.186657 786749 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.186674 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.186772 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.186788 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.186970 786749 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.187587 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.188872 786749 syscalls.go:262] [ 648: 648] Allocating stack with size of 8388608 bytes D0713 00:07:57.189058 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.190292 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.190367 786749 usertrap_amd64.go:106] [ 648: 648] Map a usertrap vma at 62000 D0713 00:07:57.190449 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 1 D0713 00:07:57.190544 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:57.190884 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.190908 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 2 D0713 00:07:57.190919 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:57.191569 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.191593 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 3 D0713 00:07:57.191602 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:57.198167 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.198200 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 4 D0713 00:07:57.198214 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:57.202154 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.202171 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 5 D0713 00:07:57.202202 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:57.202259 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.202277 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 6 D0713 00:07:57.202286 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:57.202662 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.202689 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 7 D0713 00:07:57.202699 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:57.202875 786749 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.202904 786749 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0004a8a20 8 D0713 00:07:57.202914 786749 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:57.203072 786749 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.203108 786749 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0004a8a20 9 D0713 00:07:57.203121 786749 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:57.203133 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.203137 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 10 D0713 00:07:57.203142 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:57.212240 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.212274 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 11 D0713 00:07:57.212287 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:57.214836 786749 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.214855 786749 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0004a8a20 12 D0713 00:07:57.214873 786749 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:57.214936 786749 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.214942 786749 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0004a8a20 13 D0713 00:07:57.214949 786749 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:57.214965 786749 task_signals.go:470] [ 648: 648] Notified of signal 23 D0713 00:07:57.215037 786749 task_signals.go:220] [ 648: 648] Signal 23: delivering to handler D0713 00:07:57.223990 786749 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.224029 786749 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0004a8a20 14 D0713 00:07:57.224040 786749 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:57.224105 786749 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.224130 786749 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.224160 786749 task_signals.go:204] [ 648: 652] Signal 648, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.224161 786749 task_signals.go:204] [ 648: 650] Signal 648, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.224190 786749 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.224196 786749 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.224184 786749 task_signals.go:204] [ 648: 649] Signal 648, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.224200 786749 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.224252 786749 task_signals.go:204] [ 648: 651] Signal 648, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.224268 786749 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.224287 786749 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.224307 786749 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.224325 786749 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.224338 786749 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.224344 786749 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.224354 786749 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.225879 786749 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.225895 786749 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.225907 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.226065 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.226129 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.226207 786749 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.226911 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.228233 786749 syscalls.go:262] [ 653: 653] Allocating stack with size of 8388608 bytes D0713 00:07:57.228352 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.229667 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.229699 786749 usertrap_amd64.go:106] [ 653: 653] Map a usertrap vma at 62000 D0713 00:07:57.229767 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 1 D0713 00:07:57.229804 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:57.230075 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.230093 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 2 D0713 00:07:57.230104 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:57.230634 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.230656 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 3 D0713 00:07:57.230671 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:57.236915 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.236983 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 4 D0713 00:07:57.236998 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:57.238111 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.238138 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 5 D0713 00:07:57.238149 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:57.238188 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.238199 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 6 D0713 00:07:57.238205 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:57.238493 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.238509 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 7 D0713 00:07:57.238515 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:57.238662 786749 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.238688 786749 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001c9a300 8 D0713 00:07:57.238701 786749 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:57.238935 786749 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.238966 786749 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001c9a300 9 D0713 00:07:57.238980 786749 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:57.239011 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.239031 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 10 D0713 00:07:57.239039 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:57.239489 786749 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.239512 786749 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001c9a300 11 D0713 00:07:57.239521 786749 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:57.239615 786749 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.239633 786749 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001c9a300 12 D0713 00:07:57.239644 786749 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:57.239696 786749 task_signals.go:470] [ 653: 653] Notified of signal 23 D0713 00:07:57.239796 786749 task_signals.go:220] [ 653: 653] Signal 23: delivering to handler D0713 00:07:57.246792 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.246819 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 13 D0713 00:07:57.246829 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:57.250028 786749 task_signals.go:470] [ 653: 653] Notified of signal 23 D0713 00:07:57.250082 786749 task_signals.go:220] [ 653: 653] Signal 23: delivering to handler D0713 00:07:57.257704 786749 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.257743 786749 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001c9a300 14 D0713 00:07:57.257757 786749 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:57.257845 786749 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.257879 786749 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.257904 786749 task_signals.go:204] [ 653: 657] Signal 653, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.257927 786749 task_exit.go:204] [ 653: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.257925 786749 task_signals.go:204] [ 653: 655] Signal 653, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.257937 786749 task_exit.go:204] [ 653: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.257961 786749 task_exit.go:204] [ 653: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.257923 786749 task_signals.go:204] [ 653: 656] Signal 653, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.257912 786749 task_signals.go:204] [ 653: 654] Signal 653, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.257983 786749 task_exit.go:204] [ 653: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.258014 786749 task_exit.go:204] [ 653: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.258047 786749 task_exit.go:204] [ 653: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.258065 786749 task_exit.go:204] [ 653: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.258083 786749 task_exit.go:204] [ 653: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.258087 786749 task_exit.go:204] [ 653: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.258094 786749 task_exit.go:204] [ 653: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.259767 786749 task_exit.go:204] [ 653: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.259811 786749 task_exit.go:204] [ 653: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.259829 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.259890 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.259914 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.260135 786749 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.260788 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.262229 786749 syscalls.go:262] [ 658: 658] Allocating stack with size of 8388608 bytes D0713 00:07:57.262340 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.263726 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.263770 786749 usertrap_amd64.go:106] [ 658: 658] Map a usertrap vma at 69000 D0713 00:07:57.263906 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 1 D0713 00:07:57.263944 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.264329 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.264357 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 2 D0713 00:07:57.264369 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.265014 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.265063 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 3 D0713 00:07:57.265081 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.271289 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.271318 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 4 D0713 00:07:57.271329 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.272505 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.272552 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 5 D0713 00:07:57.272566 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.272632 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.272654 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 6 D0713 00:07:57.272664 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.273034 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.273067 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 7 D0713 00:07:57.273078 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.273252 786749 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.273277 786749 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc001565650 8 D0713 00:07:57.273287 786749 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.273482 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.273497 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 9 D0713 00:07:57.273506 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.273683 786749 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.273702 786749 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc001565650 10 D0713 00:07:57.273713 786749 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.273746 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.273763 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 11 D0713 00:07:57.273772 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.280700 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.280723 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 12 D0713 00:07:57.280731 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.284327 786749 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.284355 786749 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc001565650 13 D0713 00:07:57.284367 786749 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.284433 786749 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.284445 786749 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc001565650 14 D0713 00:07:57.284451 786749 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.284466 786749 task_signals.go:470] [ 658: 658] Notified of signal 23 D0713 00:07:57.284539 786749 task_signals.go:220] [ 658: 658] Signal 23: delivering to handler D0713 00:07:57.291716 786749 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.291782 786749 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc001565650 15 D0713 00:07:57.291800 786749 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 00:07:57.291881 786749 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.291922 786749 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.291954 786749 task_signals.go:204] [ 658: 661] Signal 658, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.291978 786749 task_exit.go:204] [ 658: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.291986 786749 task_exit.go:204] [ 658: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.291973 786749 task_signals.go:204] [ 658: 659] Signal 658, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.291949 786749 task_signals.go:204] [ 658: 660] Signal 658, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.291991 786749 task_exit.go:204] [ 658: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.292016 786749 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.291978 786749 task_signals.go:204] [ 658: 662] Signal 658, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.292046 786749 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.292067 786749 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.292085 786749 task_exit.go:204] [ 658: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.292124 786749 task_exit.go:204] [ 658: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.292129 786749 task_exit.go:204] [ 658: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.292144 786749 task_exit.go:204] [ 658: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.293590 786749 task_exit.go:204] [ 658: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.293646 786749 task_exit.go:204] [ 658: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.293701 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.293749 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.293761 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.293886 786749 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.294586 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.296478 786749 syscalls.go:262] [ 663: 663] Allocating stack with size of 8388608 bytes D0713 00:07:57.296607 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.299964 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.300016 786749 usertrap_amd64.go:106] [ 663: 663] Map a usertrap vma at 65000 D0713 00:07:57.300239 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 1 D0713 00:07:57.300277 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:57.300657 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.300682 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 2 D0713 00:07:57.300693 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:57.302198 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.302233 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 3 D0713 00:07:57.302242 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:57.311351 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.311381 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 4 D0713 00:07:57.311395 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:57.312496 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.312517 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 5 D0713 00:07:57.312525 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:57.312583 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.312595 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 6 D0713 00:07:57.312599 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:57.312897 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.312911 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 7 D0713 00:07:57.312917 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:57.313070 786749 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.313093 786749 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001c9a990 8 D0713 00:07:57.313106 786749 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:57.313189 786749 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.313212 786749 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001c9a990 9 D0713 00:07:57.313222 786749 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:57.313385 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.313422 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 10 D0713 00:07:57.313440 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:57.313644 786749 usertrap_amd64.go:212] [ 663: 666] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.313671 786749 usertrap_amd64.go:122] [ 663: 666] Allocate a new trap: 0xc001c9a990 11 D0713 00:07:57.313685 786749 usertrap_amd64.go:225] [ 663: 666] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:57.322344 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.322419 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 12 D0713 00:07:57.322436 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:57.326885 786749 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.326922 786749 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001c9a990 13 D0713 00:07:57.326934 786749 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:57.327064 786749 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.327081 786749 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001c9a990 14 D0713 00:07:57.327093 786749 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:57.327167 786749 task_signals.go:470] [ 663: 663] Notified of signal 23 D0713 00:07:57.327274 786749 task_signals.go:220] [ 663: 663] Signal 23: delivering to handler D0713 00:07:57.335709 786749 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.335728 786749 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001c9a990 15 D0713 00:07:57.335740 786749 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 00:07:57.335795 786749 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.335823 786749 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.335853 786749 task_signals.go:204] [ 663: 664] Signal 663, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.335873 786749 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.335884 786749 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.335891 786749 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.335907 786749 task_signals.go:204] [ 663: 665] Signal 663, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.335937 786749 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.335945 786749 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.335951 786749 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.335964 786749 task_signals.go:204] [ 663: 666] Signal 663, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.335973 786749 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.335980 786749 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.335985 786749 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.336001 786749 task_signals.go:204] [ 663: 667] Signal 663, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.336011 786749 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.336019 786749 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.336024 786749 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.336036 786749 task_signals.go:204] [ 663: 668] Signal 663, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.336047 786749 task_exit.go:204] [ 663: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.337582 786749 task_exit.go:204] [ 663: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.337607 786749 task_exit.go:204] [ 663: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.337618 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.337652 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.337665 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.337821 786749 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.338315 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.339890 786749 syscalls.go:262] [ 669: 669] Allocating stack with size of 8388608 bytes D0713 00:07:57.339990 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.344438 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.344462 786749 usertrap_amd64.go:106] [ 669: 669] Map a usertrap vma at 61000 D0713 00:07:57.344587 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 1 D0713 00:07:57.344622 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:57.345022 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.345052 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 2 D0713 00:07:57.345063 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:57.346267 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.346284 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 3 D0713 00:07:57.346294 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:57.352436 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.352652 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 4 D0713 00:07:57.352687 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:57.355707 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.355732 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 5 D0713 00:07:57.355748 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:57.355791 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.355797 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 6 D0713 00:07:57.355804 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:57.356268 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.356275 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 7 D0713 00:07:57.356284 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:57.356458 786749 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.356518 786749 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0004a9350 8 D0713 00:07:57.356537 786749 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:57.356870 786749 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.356895 786749 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0004a9350 9 D0713 00:07:57.356906 786749 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:57.357125 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.357138 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 10 D0713 00:07:57.357148 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:57.366439 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.366474 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 11 D0713 00:07:57.366489 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:57.367670 786749 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.367709 786749 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0004a9350 12 D0713 00:07:57.367725 786749 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:57.367764 786749 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.367781 786749 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0004a9350 13 D0713 00:07:57.367796 786749 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:57.367845 786749 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 00:07:57.367875 786749 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 00:07:57.378719 786749 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 00:07:57.379095 786749 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 00:07:57.379201 786749 task_signals.go:481] [ 669: 669] No task notified of signal 23 D0713 00:07:57.379250 786749 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 00:07:57.379604 786749 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.379633 786749 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0004a9350 14 D0713 00:07:57.379646 786749 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:57.379748 786749 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.379779 786749 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.379814 786749 task_signals.go:204] [ 669: 670] Signal 669, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.379828 786749 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.379838 786749 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.379843 786749 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.379865 786749 task_signals.go:204] [ 669: 671] Signal 669, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.379876 786749 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.379892 786749 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.379898 786749 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.379926 786749 task_signals.go:204] [ 669: 672] Signal 669, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.379937 786749 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.379945 786749 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.379951 786749 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.380014 786749 task_signals.go:204] [ 669: 673] Signal 669, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.380073 786749 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.381812 786749 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.381856 786749 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.381876 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.381916 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.381927 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.382004 786749 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.382568 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.384036 786749 syscalls.go:262] [ 674: 674] Allocating stack with size of 8388608 bytes D0713 00:07:57.384125 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.387541 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.387584 786749 usertrap_amd64.go:106] [ 674: 674] Map a usertrap vma at 66000 D0713 00:07:57.387693 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 1 D0713 00:07:57.387726 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:57.388190 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.388212 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 2 D0713 00:07:57.388222 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:57.389443 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.389540 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 3 D0713 00:07:57.389598 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:57.397421 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.397459 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 4 D0713 00:07:57.397479 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:57.398984 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.399010 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 5 D0713 00:07:57.399024 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:57.399094 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.399109 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 6 D0713 00:07:57.399115 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:57.399427 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.399447 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 7 D0713 00:07:57.399455 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:57.399788 786749 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.399817 786749 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc0004a9770 8 D0713 00:07:57.399829 786749 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:57.400124 786749 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.400153 786749 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc0004a9770 9 D0713 00:07:57.400166 786749 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:57.400269 786749 usertrap_amd64.go:212] [ 674: 677] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.400295 786749 usertrap_amd64.go:122] [ 674: 677] Allocate a new trap: 0xc0004a9770 10 D0713 00:07:57.400305 786749 usertrap_amd64.go:225] [ 674: 677] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:57.400343 786749 usertrap_amd64.go:212] [ 674: 676] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.400355 786749 usertrap_amd64.go:122] [ 674: 676] Allocate a new trap: 0xc0004a9770 11 D0713 00:07:57.400366 786749 usertrap_amd64.go:225] [ 674: 676] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:57.408512 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.408549 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 12 D0713 00:07:57.408565 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:57.411456 786749 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.411489 786749 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc0004a9770 13 D0713 00:07:57.411514 786749 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:57.411566 786749 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.411574 786749 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc0004a9770 14 D0713 00:07:57.411583 786749 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:57.411605 786749 task_signals.go:470] [ 674: 674] Notified of signal 23 D0713 00:07:57.411685 786749 task_signals.go:220] [ 674: 674] Signal 23: delivering to handler D0713 00:07:57.420170 786749 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.420203 786749 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc0004a9770 15 D0713 00:07:57.420219 786749 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:07:57.420287 786749 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.420311 786749 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.420333 786749 task_signals.go:204] [ 674: 677] Signal 674, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.420330 786749 task_signals.go:204] [ 674: 679] Signal 674, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.420348 786749 task_signals.go:204] [ 674: 676] Signal 674, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.420355 786749 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.420364 786749 task_signals.go:204] [ 674: 678] Signal 674, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.420376 786749 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.420392 786749 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.420408 786749 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.420417 786749 task_signals.go:204] [ 674: 675] Signal 674, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.420430 786749 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.420441 786749 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.420452 786749 task_exit.go:204] [ 674: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.420460 786749 task_exit.go:204] [ 674: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.420466 786749 task_exit.go:204] [ 674: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.420476 786749 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.420484 786749 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.420490 786749 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.420498 786749 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.421916 786749 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.421946 786749 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.421960 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.426115 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.426153 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.426374 786749 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.426970 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.428397 786749 syscalls.go:262] [ 680: 680] Allocating stack with size of 8388608 bytes D0713 00:07:57.428571 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.430245 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.430292 786749 usertrap_amd64.go:106] [ 680: 680] Map a usertrap vma at 66000 D0713 00:07:57.430390 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 1 D0713 00:07:57.430417 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:57.430842 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.430861 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 2 D0713 00:07:57.430870 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:57.431648 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.431685 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 3 D0713 00:07:57.431701 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:57.439197 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.439226 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 4 D0713 00:07:57.439252 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:57.440512 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.440545 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 5 D0713 00:07:57.440560 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:57.440629 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.440639 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 6 D0713 00:07:57.440647 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:57.441054 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.441122 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 7 D0713 00:07:57.441189 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:57.441482 786749 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.441863 786749 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc001b3f050 8 D0713 00:07:57.442082 786749 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:57.442124 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.442134 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 9 D0713 00:07:57.442142 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:57.442261 786749 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.442278 786749 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc001b3f050 10 D0713 00:07:57.442287 786749 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:57.452928 786749 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.453020 786749 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc001b3f050 11 D0713 00:07:57.453057 786749 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:57.453129 786749 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.453151 786749 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc001b3f050 12 D0713 00:07:57.453161 786749 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:57.453606 786749 task_signals.go:470] [ 680: 680] Notified of signal 23 D0713 00:07:57.453653 786749 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0713 00:07:57.453828 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.453856 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 13 D0713 00:07:57.453868 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:57.461654 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.461694 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 14 D0713 00:07:57.461710 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b6e0 trap addr 66460 ([184 24 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:57.463926 786749 task_signals.go:470] [ 680: 680] Notified of signal 23 D0713 00:07:57.464035 786749 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0713 00:07:57.464147 786749 task_signals.go:470] [ 680: 680] Notified of signal 23 D0713 00:07:57.464177 786749 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0713 00:07:57.467598 786749 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.467651 786749 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc001b3f050 15 D0713 00:07:57.467672 786749 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:07:57.467739 786749 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.467774 786749 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.467805 786749 task_signals.go:204] [ 680: 683] Signal 680, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.467824 786749 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.467835 786749 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.467842 786749 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.467809 786749 task_signals.go:204] [ 680: 681] Signal 680, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.467796 786749 task_signals.go:204] [ 680: 682] Signal 680, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.467861 786749 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.467882 786749 task_signals.go:204] [ 680: 684] Signal 680, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.467898 786749 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.467905 786749 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.467918 786749 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.467925 786749 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.467938 786749 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.467948 786749 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.469454 786749 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.469481 786749 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.469495 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.469575 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.469595 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.469748 786749 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.470274 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.471622 786749 syscalls.go:262] [ 685: 685] Allocating stack with size of 8388608 bytes D0713 00:07:57.471746 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.479127 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.479164 786749 usertrap_amd64.go:106] [ 685: 685] Map a usertrap vma at 69000 D0713 00:07:57.479253 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 1 D0713 00:07:57.479275 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.479606 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.479627 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 2 D0713 00:07:57.479635 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.481263 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.481280 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 3 D0713 00:07:57.481291 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.488154 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.488194 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 4 D0713 00:07:57.488206 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.489716 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.489747 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 5 D0713 00:07:57.489760 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.489803 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.489808 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 6 D0713 00:07:57.489817 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.489967 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.489971 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 7 D0713 00:07:57.489976 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.490137 786749 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.490156 786749 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc001341a10 8 D0713 00:07:57.490170 786749 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.490343 786749 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.490354 786749 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc001341a10 9 D0713 00:07:57.490362 786749 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.490384 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.490400 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 10 D0713 00:07:57.490405 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.497825 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.497852 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 11 D0713 00:07:57.497861 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.500663 786749 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.500690 786749 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc001341a10 12 D0713 00:07:57.500703 786749 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.500740 786749 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.500748 786749 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc001341a10 13 D0713 00:07:57.500755 786749 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.500769 786749 task_signals.go:470] [ 685: 685] Notified of signal 23 D0713 00:07:57.500816 786749 task_signals.go:220] [ 685: 685] Signal 23: delivering to handler I0713 00:07:57.508166 786749 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 00:07:57.508230 786749 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.508246 786749 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc001341a10 14 D0713 00:07:57.508259 786749 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.508299 786749 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.508322 786749 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.508323 786749 task_signals.go:204] [ 685: 686] Signal 685, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.508347 786749 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.508346 786749 task_signals.go:204] [ 685: 688] Signal 685, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.508357 786749 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.508348 786749 task_signals.go:204] [ 685: 687] Signal 685, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.508366 786749 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.508371 786749 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.508387 786749 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.508404 786749 task_signals.go:204] [ 685: 689] Signal 685, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.508411 786749 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.508415 786749 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.508420 786749 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.508426 786749 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.508432 786749 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.509943 786749 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.509982 786749 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.509996 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.510145 786749 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.510233 786749 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 00:07:57.510039 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.510334 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.510345 786749 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 00:07:57.510697 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.511970 786749 syscalls.go:262] [ 690: 690] Allocating stack with size of 8388608 bytes D0713 00:07:57.512076 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.514535 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.514570 786749 usertrap_amd64.go:106] [ 690: 690] Map a usertrap vma at 63000 D0713 00:07:57.514631 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 1 D0713 00:07:57.514671 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:57.514962 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.514986 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 2 D0713 00:07:57.514996 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:57.515347 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.515364 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 3 D0713 00:07:57.515370 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:57.521164 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.521182 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 4 D0713 00:07:57.521190 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:57.522365 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.522395 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 5 D0713 00:07:57.522417 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:57.522468 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.522485 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 6 D0713 00:07:57.522494 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:57.522700 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.522727 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 7 D0713 00:07:57.522738 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:57.522858 786749 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.522871 786749 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc001341ec0 8 D0713 00:07:57.522878 786749 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:57.523092 786749 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.523110 786749 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc001341ec0 9 D0713 00:07:57.523120 786749 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:57.523185 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.523217 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 10 D0713 00:07:57.523234 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:57.530428 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.530457 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 11 D0713 00:07:57.530468 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:57.534548 786749 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.534567 786749 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc001341ec0 12 D0713 00:07:57.534578 786749 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:57.534657 786749 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.534682 786749 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc001341ec0 13 D0713 00:07:57.534694 786749 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:57.534796 786749 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 00:07:57.534985 786749 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 00:07:57.540347 786749 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.540376 786749 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc001341ec0 14 D0713 00:07:57.540389 786749 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:57.540435 786749 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.540461 786749 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.540487 786749 task_signals.go:204] [ 690: 693] Signal 690, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.540493 786749 task_signals.go:204] [ 690: 691] Signal 690, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.540512 786749 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.540527 786749 task_signals.go:204] [ 690: 692] Signal 690, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.540549 786749 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.540556 786749 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.540572 786749 task_signals.go:204] [ 690: 694] Signal 690, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.540591 786749 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.540597 786749 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.540600 786749 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.540607 786749 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.540621 786749 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.540627 786749 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.540636 786749 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.542003 786749 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.542036 786749 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.542056 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.542082 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.542101 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.542170 786749 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.542281 786749 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 00:07:57.542349 786749 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 00:07:57.542659 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.543961 786749 syscalls.go:262] [ 695: 695] Allocating stack with size of 8388608 bytes D0713 00:07:57.544049 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.544656 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.544693 786749 usertrap_amd64.go:106] [ 695: 695] Map a usertrap vma at 69000 D0713 00:07:57.544970 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 1 D0713 00:07:57.545038 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.545573 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.545600 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 2 D0713 00:07:57.545638 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.546340 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.546361 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 3 D0713 00:07:57.546369 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.552895 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.552927 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 4 D0713 00:07:57.552974 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.554145 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.554174 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 5 D0713 00:07:57.554184 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.554238 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.554247 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 6 D0713 00:07:57.554253 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.554683 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.554704 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 7 D0713 00:07:57.554711 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.554867 786749 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.554934 786749 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0009880c0 8 D0713 00:07:57.554954 786749 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.555131 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.555151 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 9 D0713 00:07:57.555162 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.555184 786749 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.555208 786749 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0009880c0 10 D0713 00:07:57.555221 786749 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.563508 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.563548 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 11 D0713 00:07:57.563563 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.566095 786749 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.566126 786749 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0009880c0 12 D0713 00:07:57.566137 786749 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.566222 786749 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.566241 786749 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0009880c0 13 D0713 00:07:57.566254 786749 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.566295 786749 task_signals.go:470] [ 695: 695] Notified of signal 23 D0713 00:07:57.566383 786749 task_signals.go:220] [ 695: 695] Signal 23: delivering to handler D0713 00:07:57.574540 786749 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.574574 786749 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0009880c0 14 D0713 00:07:57.574589 786749 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.574652 786749 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.574680 786749 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.574697 786749 task_signals.go:204] [ 695: 698] Signal 695, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.574705 786749 task_signals.go:204] [ 695: 699] Signal 695, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.574718 786749 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.574727 786749 task_signals.go:204] [ 695: 696] Signal 695, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.574714 786749 task_signals.go:204] [ 695: 697] Signal 695, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.574740 786749 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.574746 786749 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.574765 786749 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.574781 786749 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.574787 786749 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.574800 786749 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.574808 786749 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.574820 786749 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.574829 786749 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.576194 786749 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.576244 786749 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.576259 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.576292 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.576302 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.576473 786749 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.577620 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.579218 786749 syscalls.go:262] [ 700: 700] Allocating stack with size of 8388608 bytes D0713 00:07:57.579344 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.580539 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.580577 786749 usertrap_amd64.go:106] [ 700: 700] Map a usertrap vma at 69000 D0713 00:07:57.580680 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 1 D0713 00:07:57.580709 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.581192 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.581211 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 2 D0713 00:07:57.581219 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.582378 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.582409 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 3 D0713 00:07:57.582419 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.589058 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.589088 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 4 D0713 00:07:57.589101 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.590805 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.590847 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 5 D0713 00:07:57.590865 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.590948 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.590968 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 6 D0713 00:07:57.590979 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.591414 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.591440 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 7 D0713 00:07:57.591450 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.591603 786749 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.591612 786749 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000988210 8 D0713 00:07:57.591622 786749 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.591862 786749 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.591879 786749 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000988210 9 D0713 00:07:57.591890 786749 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.591953 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.591980 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 10 D0713 00:07:57.591992 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.592197 786749 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.592223 786749 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000988210 11 D0713 00:07:57.592234 786749 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.592286 786749 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.592299 786749 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000988210 12 D0713 00:07:57.592308 786749 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.592330 786749 task_signals.go:470] [ 700: 703] Notified of signal 23 D0713 00:07:57.592355 786749 task_signals.go:179] [ 700: 703] Restarting syscall 202: interrupted by signal 23 D0713 00:07:57.592373 786749 task_signals.go:220] [ 700: 703] Signal 23: delivering to handler D0713 00:07:57.592653 786749 task_signals.go:470] [ 700: 700] Notified of signal 23 D0713 00:07:57.592692 786749 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler D0713 00:07:57.600739 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.600773 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 13 D0713 00:07:57.600786 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.605103 786749 task_signals.go:470] [ 700: 700] Notified of signal 23 D0713 00:07:57.605206 786749 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler D0713 00:07:57.612522 786749 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.612578 786749 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000988210 14 D0713 00:07:57.612597 786749 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.612705 786749 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.612792 786749 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.612794 786749 task_signals.go:204] [ 700: 704] Signal 700, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.612825 786749 task_signals.go:204] [ 700: 702] Signal 700, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.612824 786749 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.612849 786749 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.612853 786749 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.612866 786749 task_signals.go:204] [ 700: 701] Signal 700, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.612875 786749 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.612880 786749 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.612884 786749 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.612894 786749 task_signals.go:204] [ 700: 703] Signal 700, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.612901 786749 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.612906 786749 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.612909 786749 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.612918 786749 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.614565 786749 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.614605 786749 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.614622 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.614648 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.614666 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.614763 786749 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.615609 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.617413 786749 syscalls.go:262] [ 705: 705] Allocating stack with size of 8388608 bytes D0713 00:07:57.617546 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.626437 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.626481 786749 usertrap_amd64.go:106] [ 705: 705] Map a usertrap vma at 66000 D0713 00:07:57.626613 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 1 D0713 00:07:57.626669 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:57.627231 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.627259 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 2 D0713 00:07:57.627270 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:57.629419 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.629452 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 3 D0713 00:07:57.629472 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:57.642915 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.642970 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 4 D0713 00:07:57.643009 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:57.649150 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.649199 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 5 D0713 00:07:57.649219 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:57.653058 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.653114 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 6 D0713 00:07:57.653134 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:57.653944 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.653968 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 7 D0713 00:07:57.653982 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:57.654232 786749 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.654269 786749 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0004a9a40 8 D0713 00:07:57.654286 786749 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:57.654590 786749 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.654612 786749 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0004a9a40 9 D0713 00:07:57.654624 786749 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:57.654709 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.654730 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 10 D0713 00:07:57.654743 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:57.662657 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.662690 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 11 D0713 00:07:57.662702 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:57.665592 786749 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.665624 786749 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0004a9a40 12 D0713 00:07:57.665639 786749 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:57.665714 786749 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.665735 786749 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0004a9a40 13 D0713 00:07:57.665746 786749 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:57.665806 786749 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:07:57.665940 786749 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:07:57.674856 786749 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.674901 786749 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0004a9a40 14 D0713 00:07:57.674922 786749 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:57.674988 786749 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.675016 786749 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.675052 786749 task_signals.go:204] [ 705: 709] Signal 705, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.675039 786749 task_signals.go:204] [ 705: 706] Signal 705, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.675052 786749 task_signals.go:204] [ 705: 708] Signal 705, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.675076 786749 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.675113 786749 task_signals.go:204] [ 705: 707] Signal 705, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.675118 786749 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.675146 786749 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.675165 786749 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.675176 786749 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.675204 786749 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.675216 786749 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.675232 786749 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.675237 786749 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.675246 786749 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.676670 786749 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.676703 786749 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.676721 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.676745 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.676752 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.677036 786749 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.677557 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.679110 786749 syscalls.go:262] [ 710: 710] Allocating stack with size of 8388608 bytes D0713 00:07:57.679275 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.680298 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.680330 786749 usertrap_amd64.go:106] [ 710: 710] Map a usertrap vma at 68000 D0713 00:07:57.680407 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 1 D0713 00:07:57.680435 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:57.680697 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.680716 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 2 D0713 00:07:57.680722 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:57.681305 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.681325 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 3 D0713 00:07:57.681332 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:57.687839 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.687881 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 4 D0713 00:07:57.687894 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:57.689184 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.689222 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 5 D0713 00:07:57.689234 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:57.689333 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.689345 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 6 D0713 00:07:57.689360 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:57.689693 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.689775 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 7 D0713 00:07:57.689790 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:57.690004 786749 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.690033 786749 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001b3fc50 8 D0713 00:07:57.690045 786749 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:57.690194 786749 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.690223 786749 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001b3fc50 9 D0713 00:07:57.690234 786749 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:57.690283 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.690299 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 10 D0713 00:07:57.690308 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:57.700760 786749 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.700826 786749 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001b3fc50 11 D0713 00:07:57.700846 786749 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:57.701231 786749 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.701260 786749 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001b3fc50 12 D0713 00:07:57.701284 786749 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:57.703049 786749 task_signals.go:470] [ 710: 710] Notified of signal 23 D0713 00:07:57.703192 786749 task_signals.go:220] [ 710: 710] Signal 23: delivering to handler D0713 00:07:57.705993 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.706038 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 13 D0713 00:07:57.706053 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:57.714600 786749 task_signals.go:470] [ 710: 710] Notified of signal 23 D0713 00:07:57.714779 786749 task_signals.go:220] [ 710: 710] Signal 23: delivering to handler D0713 00:07:57.718407 786749 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.718432 786749 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001b3fc50 14 D0713 00:07:57.718457 786749 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:57.719437 786749 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.719475 786749 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.719479 786749 task_signals.go:204] [ 710: 714] Signal 710, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.719496 786749 task_signals.go:204] [ 710: 712] Signal 710, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.719504 786749 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.719524 786749 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.719531 786749 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.719548 786749 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.719555 786749 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.719571 786749 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.719585 786749 task_signals.go:204] [ 710: 713] Signal 710, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.719609 786749 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.719617 786749 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.719625 786749 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.719637 786749 task_signals.go:204] [ 710: 711] Signal 710, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.719647 786749 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.721073 786749 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.721100 786749 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.721119 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.721168 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.721196 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.721255 786749 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.721899 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.723266 786749 syscalls.go:262] [ 715: 715] Allocating stack with size of 8388608 bytes D0713 00:07:57.723375 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.724332 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.724407 786749 usertrap_amd64.go:106] [ 715: 715] Map a usertrap vma at 6a000 D0713 00:07:57.724547 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 1 D0713 00:07:57.724596 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:57.725044 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.725076 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 2 D0713 00:07:57.725091 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:57.725695 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.725765 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 3 D0713 00:07:57.725792 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:57.734268 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.734306 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 4 D0713 00:07:57.734320 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:57.735376 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.735399 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 5 D0713 00:07:57.735408 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:57.735450 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.735458 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 6 D0713 00:07:57.735466 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:57.735719 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.735739 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 7 D0713 00:07:57.735745 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:57.735907 786749 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.735931 786749 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc00170ee40 8 D0713 00:07:57.735939 786749 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:57.736068 786749 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.736098 786749 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc00170ee40 9 D0713 00:07:57.736107 786749 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:57.736252 786749 usertrap_amd64.go:212] [ 715: 718] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.736278 786749 usertrap_amd64.go:122] [ 715: 718] Allocate a new trap: 0xc00170ee40 10 D0713 00:07:57.736290 786749 usertrap_amd64.go:225] [ 715: 718] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:57.744833 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.744870 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 11 D0713 00:07:57.744882 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:57.749062 786749 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 00:07:57.751098 786749 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.751155 786749 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc00170ee40 12 D0713 00:07:57.751174 786749 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:57.751237 786749 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.751246 786749 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc00170ee40 13 D0713 00:07:57.751257 786749 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:57.751297 786749 task_signals.go:470] [ 715: 715] Notified of signal 23 D0713 00:07:57.751354 786749 task_signals.go:220] [ 715: 715] Signal 23: delivering to handler I0713 00:07:57.758639 786749 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 00:07:57.758706 786749 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.758718 786749 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc00170ee40 14 D0713 00:07:57.758730 786749 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:57.758760 786749 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758794 786749 task_signals.go:204] [ 715: 716] Signal 715, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.758815 786749 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758832 786749 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758841 786749 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758846 786749 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.758875 786749 task_signals.go:204] [ 715: 720] Signal 715, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.758910 786749 task_exit.go:204] [ 715: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758931 786749 task_exit.go:204] [ 715: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758939 786749 task_exit.go:204] [ 715: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.758955 786749 task_signals.go:204] [ 715: 718] Signal 715, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.759029 786749 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.759043 786749 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.759050 786749 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.758974 786749 task_signals.go:204] [ 715: 717] Signal 715, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.759094 786749 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.759140 786749 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.759149 786749 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.759068 786749 task_signals.go:204] [ 715: 719] Signal 715, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.759183 786749 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.760604 786749 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.760632 786749 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.760649 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.760682 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.760696 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.760791 786749 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.761438 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.763014 786749 syscalls.go:262] [ 721: 721] Allocating stack with size of 8388608 bytes D0713 00:07:57.763224 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.765178 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.765225 786749 usertrap_amd64.go:106] [ 721: 721] Map a usertrap vma at 68000 D0713 00:07:57.765351 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 1 D0713 00:07:57.765385 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:57.765829 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.765857 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 2 D0713 00:07:57.765877 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:57.766657 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.766687 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 3 D0713 00:07:57.766700 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:57.775192 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.775230 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 4 D0713 00:07:57.775244 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:57.776471 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.776499 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 5 D0713 00:07:57.776509 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:57.776571 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.776586 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 6 D0713 00:07:57.776592 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:57.777072 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.777099 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 7 D0713 00:07:57.777120 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:57.777311 786749 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.777330 786749 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc001b3fd70 8 D0713 00:07:57.777340 786749 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:57.777477 786749 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.777514 786749 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc001b3fd70 9 D0713 00:07:57.777552 786749 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:57.777799 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.777817 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 10 D0713 00:07:57.777833 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:57.786942 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.786992 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 11 D0713 00:07:57.787011 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:57.789745 786749 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.789782 786749 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc001b3fd70 12 D0713 00:07:57.789797 786749 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:57.789840 786749 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.789848 786749 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc001b3fd70 13 D0713 00:07:57.789855 786749 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:57.789885 786749 task_signals.go:470] [ 721: 721] Notified of signal 23 D0713 00:07:57.789962 786749 task_signals.go:220] [ 721: 721] Signal 23: delivering to handler D0713 00:07:57.798462 786749 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.798508 786749 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc001b3fd70 14 D0713 00:07:57.798527 786749 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:57.798585 786749 task_exit.go:204] [ 721: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798626 786749 task_signals.go:204] [ 721: 723] Signal 721, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798663 786749 task_exit.go:204] [ 721: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798683 786749 task_signals.go:204] [ 721: 725] Signal 721, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798696 786749 task_signals.go:204] [ 721: 724] Signal 721, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798711 786749 task_exit.go:204] [ 721: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798723 786749 task_signals.go:204] [ 721: 722] Signal 721, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798737 786749 task_exit.go:204] [ 721: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798754 786749 task_exit.go:204] [ 721: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798769 786749 task_exit.go:204] [ 721: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798776 786749 task_exit.go:204] [ 721: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798781 786749 task_exit.go:204] [ 721: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798803 786749 task_exit.go:204] [ 721: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798819 786749 task_exit.go:204] [ 721: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798825 786749 task_exit.go:204] [ 721: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798835 786749 task_exit.go:204] [ 721: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.800310 786749 task_exit.go:204] [ 721: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.800330 786749 task_exit.go:204] [ 721: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.800345 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.800381 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.800619 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.800455 786749 task_exit.go:204] [ 721: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.801241 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.802744 786749 syscalls.go:262] [ 726: 726] Allocating stack with size of 8388608 bytes D0713 00:07:57.802855 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.804165 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.804207 786749 usertrap_amd64.go:106] [ 726: 726] Map a usertrap vma at 63000 D0713 00:07:57.804428 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 1 D0713 00:07:57.804474 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:57.804684 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.804701 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 2 D0713 00:07:57.804708 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:57.805223 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.805245 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 3 D0713 00:07:57.805257 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:57.811925 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.811964 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 4 D0713 00:07:57.811984 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:57.813370 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.813481 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 5 D0713 00:07:57.813553 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:57.813761 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.813776 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 6 D0713 00:07:57.813788 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:57.814069 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.814102 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 7 D0713 00:07:57.814113 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:57.814264 786749 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.814302 786749 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001a9b650 8 D0713 00:07:57.814315 786749 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:57.814654 786749 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.814798 786749 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001a9b650 9 D0713 00:07:57.814817 786749 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:57.814856 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.814865 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 10 D0713 00:07:57.814876 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:57.815501 786749 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.815528 786749 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001a9b650 11 D0713 00:07:57.815540 786749 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:57.815575 786749 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.815592 786749 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001a9b650 12 D0713 00:07:57.815599 786749 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:57.815615 786749 task_signals.go:470] [ 726: 726] Notified of signal 23 D0713 00:07:57.815705 786749 task_signals.go:220] [ 726: 726] Signal 23: delivering to handler D0713 00:07:57.823442 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.823480 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 13 D0713 00:07:57.823495 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:57.826326 786749 task_signals.go:470] [ 726: 726] Notified of signal 23 D0713 00:07:57.826373 786749 task_signals.go:220] [ 726: 726] Signal 23: delivering to handler I0713 00:07:57.835476 786749 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 00:07:57.835872 786749 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.835905 786749 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001a9b650 14 D0713 00:07:57.835921 786749 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:57.835995 786749 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.836032 786749 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.836063 786749 task_signals.go:204] [ 726: 729] Signal 726, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836059 786749 task_signals.go:204] [ 726: 728] Signal 726, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836087 786749 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.836097 786749 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.836104 786749 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.836121 786749 task_signals.go:204] [ 726: 727] Signal 726, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836125 786749 task_signals.go:204] [ 726: 730] Signal 726, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836151 786749 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.836253 786749 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.836305 786749 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.836324 786749 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.836335 786749 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.836353 786749 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.836361 786749 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.837906 786749 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.837936 786749 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.837955 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.838016 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.838036 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.838136 786749 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.839016 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.841091 786749 syscalls.go:262] [ 731: 731] Allocating stack with size of 8388608 bytes D0713 00:07:57.841323 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.858253 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.858345 786749 usertrap_amd64.go:106] [ 731: 731] Map a usertrap vma at 61000 D0713 00:07:57.858458 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 1 D0713 00:07:57.858498 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:57.859082 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.859111 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 2 D0713 00:07:57.859123 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:57.859874 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.859902 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 3 D0713 00:07:57.859913 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:57.866985 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.867018 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 4 D0713 00:07:57.867028 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:57.868254 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.868287 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 5 D0713 00:07:57.868300 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:57.868337 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.868352 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 6 D0713 00:07:57.868361 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:57.868590 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.868598 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 7 D0713 00:07:57.868604 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:57.868751 786749 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.868760 786749 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc0008a9830 8 D0713 00:07:57.868766 786749 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:57.869272 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.869310 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 9 D0713 00:07:57.869327 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:57.869350 786749 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.869357 786749 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc0008a9830 10 D0713 00:07:57.869365 786749 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:57.877964 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.878003 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 11 D0713 00:07:57.878051 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:57.880904 786749 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.880924 786749 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc0008a9830 12 D0713 00:07:57.880934 786749 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:57.881073 786749 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.881092 786749 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc0008a9830 13 D0713 00:07:57.881105 786749 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:57.881301 786749 task_signals.go:470] [ 731: 731] Notified of signal 23 D0713 00:07:57.881817 786749 task_signals.go:220] [ 731: 731] Signal 23: delivering to handler D0713 00:07:57.891234 786749 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.891266 786749 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc0008a9830 14 D0713 00:07:57.891281 786749 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:57.891342 786749 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.891489 786749 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.891517 786749 task_signals.go:204] [ 731: 736] Signal 731, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.891539 786749 task_signals.go:204] [ 731: 733] Signal 731, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.891580 786749 task_signals.go:204] [ 731: 732] Signal 731, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.891611 786749 task_exit.go:204] [ 731: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.891677 786749 task_signals.go:204] [ 731: 735] Signal 731, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.891752 786749 task_signals.go:204] [ 731: 734] Signal 731, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.891777 786749 task_exit.go:204] [ 731: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.891787 786749 task_exit.go:204] [ 731: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.891804 786749 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.891814 786749 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.891820 786749 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.891829 786749 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.891840 786749 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.891848 786749 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.891859 786749 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.891889 786749 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.891898 786749 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.891910 786749 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.893694 786749 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.893729 786749 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.893745 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.897060 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.897099 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.897212 786749 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.898292 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.900000 786749 syscalls.go:262] [ 737: 737] Allocating stack with size of 8388608 bytes D0713 00:07:57.900134 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.901817 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.901864 786749 usertrap_amd64.go:106] [ 737: 737] Map a usertrap vma at 65000 D0713 00:07:57.901956 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 1 D0713 00:07:57.902002 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:57.902420 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.902440 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 2 D0713 00:07:57.902451 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:57.903213 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.903239 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 3 D0713 00:07:57.903251 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:57.911300 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.911350 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 4 D0713 00:07:57.911369 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:57.912764 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.912819 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 5 D0713 00:07:57.912836 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:57.912896 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.912913 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 6 D0713 00:07:57.912919 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:57.913320 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.913355 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 7 D0713 00:07:57.913368 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:57.913945 786749 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.913975 786749 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e581e0 8 D0713 00:07:57.913988 786749 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:57.914250 786749 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.914294 786749 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e581e0 9 D0713 00:07:57.914314 786749 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:57.914456 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.914488 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 10 D0713 00:07:57.914595 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:57.914906 786749 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.914926 786749 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e581e0 11 D0713 00:07:57.914944 786749 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:57.914965 786749 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.914972 786749 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e581e0 12 D0713 00:07:57.914979 786749 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:57.914999 786749 task_signals.go:470] [ 737: 740] Notified of signal 23 D0713 00:07:57.915035 786749 task_signals.go:179] [ 737: 740] Restarting syscall 202: interrupted by signal 23 D0713 00:07:57.915045 786749 task_signals.go:220] [ 737: 740] Signal 23: delivering to handler D0713 00:07:57.923594 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.923659 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 13 D0713 00:07:57.923693 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:57.926521 786749 task_signals.go:470] [ 737: 737] Notified of signal 23 D0713 00:07:57.926557 786749 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler I0713 00:07:57.935103 786749 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 00:07:57.935221 786749 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.935238 786749 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e581e0 14 D0713 00:07:57.935254 786749 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:57.935335 786749 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.935361 786749 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.935394 786749 task_signals.go:204] [ 737: 738] Signal 737, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.935409 786749 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.935418 786749 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.935424 786749 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.935403 786749 task_signals.go:204] [ 737: 740] Signal 737, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.935440 786749 task_signals.go:204] [ 737: 741] Signal 737, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.935443 786749 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.935441 786749 task_signals.go:204] [ 737: 739] Signal 737, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.935467 786749 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.935485 786749 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.935574 786749 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.935599 786749 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.935615 786749 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.935623 786749 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.937080 786749 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.937169 786749 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.937184 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.937226 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.937248 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.937342 786749 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.937817 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.939243 786749 syscalls.go:262] [ 742: 742] Allocating stack with size of 8388608 bytes D0713 00:07:57.939349 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.940894 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.940964 786749 usertrap_amd64.go:106] [ 742: 742] Map a usertrap vma at 63000 D0713 00:07:57.941045 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 1 D0713 00:07:57.941068 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:57.941487 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.941512 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 2 D0713 00:07:57.941529 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:57.942177 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.942200 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 3 D0713 00:07:57.942210 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:57.949579 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.949610 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 4 D0713 00:07:57.949624 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:57.950923 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.950961 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 5 D0713 00:07:57.950974 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:57.951025 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.951042 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 6 D0713 00:07:57.951050 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:57.951403 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.951425 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 7 D0713 00:07:57.951435 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:57.951668 786749 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.951773 786749 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc000b1d950 8 D0713 00:07:57.951803 786749 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:57.952115 786749 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.952139 786749 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc000b1d950 9 D0713 00:07:57.952150 786749 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:57.952251 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.952279 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 10 D0713 00:07:57.952291 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:57.952325 786749 usertrap_amd64.go:212] [ 742: 745] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.952349 786749 usertrap_amd64.go:122] [ 742: 745] Allocate a new trap: 0xc000b1d950 11 D0713 00:07:57.952364 786749 usertrap_amd64.go:225] [ 742: 745] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:57.952800 786749 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.952823 786749 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc000b1d950 12 D0713 00:07:57.952835 786749 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:57.953059 786749 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.953085 786749 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc000b1d950 13 D0713 00:07:57.953095 786749 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:57.953146 786749 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 00:07:57.953229 786749 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler D0713 00:07:57.960537 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.960563 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 14 D0713 00:07:57.960575 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:57.963412 786749 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 00:07:57.963465 786749 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler I0713 00:07:57.971497 786749 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 00:07:57.971578 786749 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.971595 786749 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc000b1d950 15 D0713 00:07:57.971607 786749 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:07:57.971689 786749 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.971732 786749 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.971762 786749 task_signals.go:204] [ 742: 745] Signal 742, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.971778 786749 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.971773 786749 task_signals.go:204] [ 742: 744] Signal 742, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.971787 786749 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.971794 786749 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.971822 786749 task_signals.go:204] [ 742: 746] Signal 742, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.971827 786749 task_signals.go:204] [ 742: 743] Signal 742, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.971847 786749 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.971858 786749 task_signals.go:204] [ 742: 747] Signal 742, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.971876 786749 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.971901 786749 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.971913 786749 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.971927 786749 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.971935 786749 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.971941 786749 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.971975 786749 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.971987 786749 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.972026 786749 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.973664 786749 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.973689 786749 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.973699 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.973726 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.973733 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.973963 786749 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.974465 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.975931 786749 syscalls.go:262] [ 748: 748] Allocating stack with size of 8388608 bytes D0713 00:07:57.976089 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.977462 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.977497 786749 usertrap_amd64.go:106] [ 748: 748] Map a usertrap vma at 68000 D0713 00:07:57.977574 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 1 D0713 00:07:57.977598 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:57.977924 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.977948 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 2 D0713 00:07:57.977958 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:57.978583 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.978609 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 3 D0713 00:07:57.978621 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:57.984813 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.984855 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 4 D0713 00:07:57.984871 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:57.986190 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.986225 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 5 D0713 00:07:57.986235 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:57.986295 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.986308 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 6 D0713 00:07:57.986313 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:57.986663 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.986693 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 7 D0713 00:07:57.986709 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:57.986853 786749 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.986878 786749 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0008a9e60 8 D0713 00:07:57.986887 786749 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:57.987183 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.987211 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 9 D0713 00:07:57.987222 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:57.987233 786749 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.987240 786749 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0008a9e60 10 D0713 00:07:57.987249 786749 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:57.994617 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.994646 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 11 D0713 00:07:57.994661 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:57.997433 786749 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.997455 786749 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0008a9e60 12 D0713 00:07:57.997475 786749 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:57.997520 786749 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.997536 786749 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0008a9e60 13 D0713 00:07:57.997544 786749 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:57.997559 786749 task_signals.go:470] [ 748: 748] Notified of signal 23 D0713 00:07:57.997601 786749 task_signals.go:220] [ 748: 748] Signal 23: delivering to handler D0713 00:07:58.004762 786749 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.004786 786749 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0008a9e60 14 D0713 00:07:58.004796 786749 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:58.004878 786749 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.004910 786749 task_signals.go:204] [ 748: 749] Signal 748, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.004999 786749 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.005036 786749 task_signals.go:204] [ 748: 752] Signal 748, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.005050 786749 task_signals.go:204] [ 748: 750] Signal 748, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.005062 786749 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.005087 786749 task_signals.go:204] [ 748: 751] Signal 748, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.005103 786749 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.005119 786749 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.005131 786749 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.005149 786749 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.005163 786749 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.005180 786749 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.005205 786749 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.005210 786749 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.005220 786749 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.006520 786749 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.006555 786749 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.006568 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.006607 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.006750 786749 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.008012 786749 task_signals.go:470] [ 6: 15] Notified of signal 23 D0713 00:07:58.008076 786749 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:07:58.008609 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.010147 786749 syscalls.go:262] [ 753: 753] Allocating stack with size of 8388608 bytes D0713 00:07:58.010277 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.011430 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.011468 786749 usertrap_amd64.go:106] [ 753: 753] Map a usertrap vma at 63000 D0713 00:07:58.011550 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 1 D0713 00:07:58.011579 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:58.011805 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.011826 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 2 D0713 00:07:58.011835 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:58.012342 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.012367 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 3 D0713 00:07:58.012388 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:58.021915 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.021945 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 4 D0713 00:07:58.021960 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:58.023067 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.023095 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 5 D0713 00:07:58.023107 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:58.023146 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.023157 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 6 D0713 00:07:58.023162 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:58.023387 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.023401 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 7 D0713 00:07:58.023409 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:58.023547 786749 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.023620 786749 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc00170f980 8 D0713 00:07:58.023640 786749 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:58.023833 786749 usertrap_amd64.go:212] [ 753: 756] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.023856 786749 usertrap_amd64.go:122] [ 753: 756] Allocate a new trap: 0xc00170f980 9 D0713 00:07:58.023867 786749 usertrap_amd64.go:225] [ 753: 756] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:58.023878 786749 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.023885 786749 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc00170f980 10 D0713 00:07:58.023892 786749 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:58.030853 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.030878 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 11 D0713 00:07:58.030887 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:58.034556 786749 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.034583 786749 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc00170f980 12 D0713 00:07:58.034597 786749 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:58.034644 786749 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.034666 786749 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc00170f980 13 D0713 00:07:58.034675 786749 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:58.034719 786749 task_signals.go:470] [ 753: 753] Notified of signal 23 D0713 00:07:58.034808 786749 task_signals.go:220] [ 753: 753] Signal 23: delivering to handler D0713 00:07:58.040434 786749 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.040464 786749 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc00170f980 14 D0713 00:07:58.040478 786749 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:58.040534 786749 task_exit.go:204] [ 753: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.040592 786749 task_exit.go:204] [ 753: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.040620 786749 task_signals.go:204] [ 753: 755] Signal 753, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.040645 786749 task_exit.go:204] [ 753: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.040656 786749 task_exit.go:204] [ 753: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.040662 786749 task_exit.go:204] [ 753: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.040676 786749 task_signals.go:204] [ 753: 754] Signal 753, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.040698 786749 task_exit.go:204] [ 753: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.040707 786749 task_exit.go:204] [ 753: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.040716 786749 task_exit.go:204] [ 753: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.040728 786749 task_signals.go:204] [ 753: 756] Signal 753, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.040749 786749 task_exit.go:204] [ 753: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.040757 786749 task_exit.go:204] [ 753: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.040763 786749 task_exit.go:204] [ 753: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.040775 786749 task_signals.go:204] [ 753: 757] Signal 753, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.040786 786749 task_exit.go:204] [ 753: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.040796 786749 task_exit.go:204] [ 753: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.040809 786749 task_exit.go:204] [ 753: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.040823 786749 task_signals.go:204] [ 753: 758] Signal 753, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.040841 786749 task_exit.go:204] [ 753: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.042256 786749 task_exit.go:204] [ 753: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.042289 786749 task_exit.go:204] [ 753: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.042302 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.042330 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.042375 786749 task_exit.go:204] [ 753: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.043062 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.044431 786749 syscalls.go:262] [ 759: 759] Allocating stack with size of 8388608 bytes D0713 00:07:58.044529 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.046280 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.046381 786749 usertrap_amd64.go:106] [ 759: 759] Map a usertrap vma at 65000 D0713 00:07:58.046473 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 1 D0713 00:07:58.046509 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:58.046862 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.046886 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 2 D0713 00:07:58.046896 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:58.047471 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.047496 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 3 D0713 00:07:58.047506 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:58.054184 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.054213 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 4 D0713 00:07:58.054225 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:58.055301 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.055377 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 5 D0713 00:07:58.055398 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:58.055453 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.055463 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 6 D0713 00:07:58.055472 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:58.055672 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.055696 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 7 D0713 00:07:58.055706 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:58.055872 786749 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.055899 786749 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0007c43c0 8 D0713 00:07:58.055912 786749 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:58.056126 786749 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.056195 786749 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0007c43c0 9 D0713 00:07:58.056264 786749 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:58.056353 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.056370 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 10 D0713 00:07:58.056379 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:58.063615 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.063628 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 11 D0713 00:07:58.063636 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:58.067284 786749 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.067344 786749 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0007c43c0 12 D0713 00:07:58.067366 786749 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:58.067394 786749 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.067401 786749 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0007c43c0 13 D0713 00:07:58.067410 786749 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:58.067474 786749 task_signals.go:470] [ 759: 759] Notified of signal 23 D0713 00:07:58.067633 786749 task_signals.go:220] [ 759: 759] Signal 23: delivering to handler D0713 00:07:58.074629 786749 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.074705 786749 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0007c43c0 14 D0713 00:07:58.074766 786749 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:58.074900 786749 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.074940 786749 task_signals.go:204] [ 759: 761] Signal 759, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.074964 786749 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.074989 786749 task_signals.go:204] [ 759: 763] Signal 759, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.075003 786749 task_signals.go:204] [ 759: 762] Signal 759, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.075029 786749 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.075042 786749 task_signals.go:204] [ 759: 760] Signal 759, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.075056 786749 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.075073 786749 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.075088 786749 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.075105 786749 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.075111 786749 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.075121 786749 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.075128 786749 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.075134 786749 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.075144 786749 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.076652 786749 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.076679 786749 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.076690 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.076745 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.076773 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.076900 786749 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.077598 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.079238 786749 syscalls.go:262] [ 764: 764] Allocating stack with size of 8388608 bytes D0713 00:07:58.079354 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.080484 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.080522 786749 usertrap_amd64.go:106] [ 764: 764] Map a usertrap vma at 62000 D0713 00:07:58.080599 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 1 D0713 00:07:58.080631 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:58.080912 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.080933 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 2 D0713 00:07:58.080966 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:58.081473 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.081493 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 3 D0713 00:07:58.081499 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:58.087874 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.087906 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 4 D0713 00:07:58.087922 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:58.089125 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.089153 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 5 D0713 00:07:58.089163 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:58.089216 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.089235 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 6 D0713 00:07:58.089243 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:58.089526 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.089557 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 7 D0713 00:07:58.089571 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:58.090029 786749 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.090043 786749 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc000d4a150 8 D0713 00:07:58.090054 786749 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:58.090384 786749 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.090413 786749 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc000d4a150 9 D0713 00:07:58.090425 786749 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:58.090620 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.090651 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 10 D0713 00:07:58.090663 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:58.098232 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.098269 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 11 D0713 00:07:58.098286 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:58.101192 786749 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.101221 786749 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc000d4a150 12 D0713 00:07:58.101233 786749 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:58.101284 786749 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.101293 786749 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc000d4a150 13 D0713 00:07:58.101301 786749 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:58.101318 786749 task_signals.go:470] [ 764: 764] Notified of signal 23 D0713 00:07:58.101369 786749 task_signals.go:220] [ 764: 764] Signal 23: delivering to handler D0713 00:07:58.109335 786749 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.109374 786749 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc000d4a150 14 D0713 00:07:58.109389 786749 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:58.109439 786749 task_exit.go:204] [ 764: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.109457 786749 task_exit.go:204] [ 764: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.109481 786749 task_signals.go:204] [ 764: 765] Signal 764, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.109498 786749 task_exit.go:204] [ 764: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.109498 786749 task_signals.go:204] [ 764: 767] Signal 764, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.109508 786749 task_exit.go:204] [ 764: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.109514 786749 task_exit.go:204] [ 764: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.109527 786749 task_signals.go:204] [ 764: 766] Signal 764, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.109545 786749 task_exit.go:204] [ 764: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.109525 786749 task_signals.go:204] [ 764: 768] Signal 764, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.109552 786749 task_exit.go:204] [ 764: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.109557 786749 task_exit.go:204] [ 764: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.109570 786749 task_exit.go:204] [ 764: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.109577 786749 task_exit.go:204] [ 764: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.109583 786749 task_exit.go:204] [ 764: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.109591 786749 task_exit.go:204] [ 764: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.111077 786749 task_exit.go:204] [ 764: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.111111 786749 task_exit.go:204] [ 764: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.111129 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.111167 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.111181 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.111277 786749 task_exit.go:204] [ 764: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.111996 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.113835 786749 syscalls.go:262] [ 769: 769] Allocating stack with size of 8388608 bytes D0713 00:07:58.113947 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.115039 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.115074 786749 usertrap_amd64.go:106] [ 769: 769] Map a usertrap vma at 64000 D0713 00:07:58.115190 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 1 D0713 00:07:58.115217 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.115744 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.115767 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 2 D0713 00:07:58.115776 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.116402 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.116430 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 3 D0713 00:07:58.116442 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.122935 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.122969 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 4 D0713 00:07:58.122979 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:58.124120 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.124150 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 5 D0713 00:07:58.124163 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:58.124217 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.124246 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 6 D0713 00:07:58.124255 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:58.124526 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.124555 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 7 D0713 00:07:58.124564 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:58.124711 786749 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.124732 786749 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc0007c4510 8 D0713 00:07:58.124751 786749 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:58.124922 786749 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.124974 786749 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc0007c4510 9 D0713 00:07:58.125012 786749 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:58.125316 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.125345 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 10 D0713 00:07:58.125361 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:58.133360 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.133390 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 11 D0713 00:07:58.133399 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:58.136054 786749 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.136091 786749 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc0007c4510 12 D0713 00:07:58.136107 786749 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:58.136177 786749 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.136200 786749 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc0007c4510 13 D0713 00:07:58.136211 786749 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:58.136257 786749 task_signals.go:470] [ 769: 769] Notified of signal 23 D0713 00:07:58.136330 786749 task_signals.go:220] [ 769: 769] Signal 23: delivering to handler D0713 00:07:58.144102 786749 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.144128 786749 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc0007c4510 14 D0713 00:07:58.144138 786749 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:58.144206 786749 task_exit.go:204] [ 769: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.144240 786749 task_exit.go:204] [ 769: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.144268 786749 task_signals.go:204] [ 769: 772] Signal 769, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.144357 786749 task_exit.go:204] [ 769: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.144380 786749 task_exit.go:204] [ 769: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.144388 786749 task_exit.go:204] [ 769: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.144278 786749 task_signals.go:204] [ 769: 773] Signal 769, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.144406 786749 task_exit.go:204] [ 769: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.144415 786749 task_exit.go:204] [ 769: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.144420 786749 task_exit.go:204] [ 769: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.144293 786749 task_signals.go:204] [ 769: 771] Signal 769, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.144459 786749 task_exit.go:204] [ 769: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.144492 786749 task_exit.go:204] [ 769: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.144500 786749 task_exit.go:204] [ 769: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.144305 786749 task_signals.go:204] [ 769: 770] Signal 769, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.144517 786749 task_exit.go:204] [ 769: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.146116 786749 task_exit.go:204] [ 769: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.146148 786749 task_exit.go:204] [ 769: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.146164 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.146193 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.146365 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.146583 786749 task_exit.go:204] [ 769: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.147355 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.149023 786749 syscalls.go:262] [ 774: 774] Allocating stack with size of 8388608 bytes D0713 00:07:58.149116 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.150448 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.150517 786749 usertrap_amd64.go:106] [ 774: 774] Map a usertrap vma at 62000 D0713 00:07:58.150847 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 1 D0713 00:07:58.150886 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:58.151553 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.151578 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 2 D0713 00:07:58.151587 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:58.152618 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.152638 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 3 D0713 00:07:58.152650 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:58.159323 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.159357 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 4 D0713 00:07:58.159370 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:58.160770 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.160808 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 5 D0713 00:07:58.160821 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:58.160867 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.160875 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 6 D0713 00:07:58.160883 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:58.161208 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.161243 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 7 D0713 00:07:58.161261 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:58.161418 786749 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.161433 786749 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc0005de3f0 8 D0713 00:07:58.161444 786749 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:58.161839 786749 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.161872 786749 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc0005de3f0 9 D0713 00:07:58.161885 786749 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:58.162014 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.162034 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 10 D0713 00:07:58.162044 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:58.171165 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.171210 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 11 D0713 00:07:58.171223 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:58.173947 786749 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.174067 786749 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc0005de3f0 12 D0713 00:07:58.174097 786749 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:58.174146 786749 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.174154 786749 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc0005de3f0 13 D0713 00:07:58.174163 786749 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:58.174197 786749 task_signals.go:470] [ 774: 774] Notified of signal 23 D0713 00:07:58.174290 786749 task_signals.go:220] [ 774: 774] Signal 23: delivering to handler D0713 00:07:58.183408 786749 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.183490 786749 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc0005de3f0 14 D0713 00:07:58.183547 786749 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:58.183595 786749 task_exit.go:204] [ 774: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.183615 786749 task_exit.go:204] [ 774: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.183637 786749 task_signals.go:204] [ 774: 776] Signal 774, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.183654 786749 task_signals.go:204] [ 774: 777] Signal 774, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.183664 786749 task_exit.go:204] [ 774: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.183634 786749 task_signals.go:204] [ 774: 775] Signal 774, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.183672 786749 task_exit.go:204] [ 774: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.183677 786749 task_exit.go:204] [ 774: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.183690 786749 task_exit.go:204] [ 774: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.183710 786749 task_exit.go:204] [ 774: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.183716 786749 task_exit.go:204] [ 774: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.183736 786749 task_exit.go:204] [ 774: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.185678 786749 task_exit.go:204] [ 774: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.185718 786749 task_exit.go:204] [ 774: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.185732 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.185767 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.185780 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.185883 786749 task_exit.go:204] [ 774: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.186485 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.188044 786749 syscalls.go:262] [ 778: 778] Allocating stack with size of 8388608 bytes D0713 00:07:58.188154 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.189822 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.189851 786749 usertrap_amd64.go:106] [ 778: 778] Map a usertrap vma at 69000 D0713 00:07:58.189932 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 1 D0713 00:07:58.189960 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:58.190348 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.190361 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 2 D0713 00:07:58.190369 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:58.191022 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.191050 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 3 D0713 00:07:58.191062 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:58.197181 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.197218 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 4 D0713 00:07:58.197232 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:58.198363 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.198427 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 5 D0713 00:07:58.198448 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:58.198503 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.198535 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 6 D0713 00:07:58.198545 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:58.199172 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.199206 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 7 D0713 00:07:58.199216 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:58.199421 786749 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.199443 786749 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc0007c4a50 8 D0713 00:07:58.199450 786749 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:58.199632 786749 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.199665 786749 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc0007c4a50 9 D0713 00:07:58.199677 786749 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:58.199774 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.199793 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 10 D0713 00:07:58.199803 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:58.200221 786749 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.200250 786749 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc0007c4a50 11 D0713 00:07:58.200263 786749 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:58.200284 786749 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.200292 786749 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc0007c4a50 12 D0713 00:07:58.200299 786749 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:58.200385 786749 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 00:07:58.200416 786749 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 00:07:58.207509 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.207539 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 13 D0713 00:07:58.207554 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:58.210580 786749 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 00:07:58.210680 786749 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 00:07:58.221072 786749 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 00:07:58.221536 786749 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 00:07:58.221971 786749 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.221998 786749 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc0007c4a50 14 D0713 00:07:58.222015 786749 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:58.222077 786749 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.222098 786749 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.222121 786749 task_signals.go:204] [ 778: 779] Signal 778, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.222135 786749 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.222143 786749 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.222157 786749 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.222178 786749 task_signals.go:204] [ 778: 780] Signal 778, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.222200 786749 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.222209 786749 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.222215 786749 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.222232 786749 task_signals.go:204] [ 778: 781] Signal 778, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.222246 786749 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.222251 786749 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.222254 786749 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.222264 786749 task_signals.go:204] [ 778: 782] Signal 778, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.222277 786749 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.223571 786749 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.223607 786749 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.223620 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.223654 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.223666 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.223795 786749 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.224323 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.225868 786749 syscalls.go:262] [ 783: 783] Allocating stack with size of 8388608 bytes D0713 00:07:58.226055 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.228075 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.228113 786749 usertrap_amd64.go:106] [ 783: 783] Map a usertrap vma at 63000 D0713 00:07:58.228271 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 1 D0713 00:07:58.228300 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:58.228696 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.228737 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 2 D0713 00:07:58.228744 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:58.229479 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.229506 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 3 D0713 00:07:58.229517 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:58.237022 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.237055 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 4 D0713 00:07:58.237068 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:58.239066 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.239093 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 5 D0713 00:07:58.239105 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:58.239147 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.239160 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 6 D0713 00:07:58.239165 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:58.239344 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.239358 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 7 D0713 00:07:58.239363 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:58.239515 786749 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.239536 786749 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000d4b080 8 D0713 00:07:58.239545 786749 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:58.239760 786749 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.239783 786749 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000d4b080 9 D0713 00:07:58.239869 786749 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:58.239897 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.239905 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 10 D0713 00:07:58.239912 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:58.247432 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.247459 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 11 D0713 00:07:58.247489 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:58.250302 786749 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.250352 786749 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000d4b080 12 D0713 00:07:58.250369 786749 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:58.250556 786749 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.250584 786749 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000d4b080 13 D0713 00:07:58.250595 786749 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:58.250675 786749 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 00:07:58.250771 786749 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 00:07:58.258536 786749 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.258584 786749 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000d4b080 14 D0713 00:07:58.258602 786749 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:58.258718 786749 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.258778 786749 task_signals.go:204] [ 783: 785] Signal 783, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.258799 786749 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.258774 786749 task_signals.go:204] [ 783: 784] Signal 783, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.258820 786749 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.258816 786749 task_signals.go:204] [ 783: 786] Signal 783, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.258841 786749 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.258849 786749 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.258865 786749 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.258887 786749 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.258903 786749 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.258915 786749 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.258932 786749 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.258938 786749 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.258964 786749 task_signals.go:204] [ 783: 787] Signal 783, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.258979 786749 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.260548 786749 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.260616 786749 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.260632 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.260661 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.260698 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.260790 786749 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.261516 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.263631 786749 syscalls.go:262] [ 788: 788] Allocating stack with size of 8388608 bytes D0713 00:07:58.263772 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.264606 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.264652 786749 usertrap_amd64.go:106] [ 788: 788] Map a usertrap vma at 69000 D0713 00:07:58.264757 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 1 D0713 00:07:58.264793 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:58.265249 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.265316 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 2 D0713 00:07:58.265368 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:58.266055 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.266080 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 3 D0713 00:07:58.266093 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:58.273130 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.273177 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 4 D0713 00:07:58.273193 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:58.274399 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.274442 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 5 D0713 00:07:58.274460 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:58.274529 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.274540 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 6 D0713 00:07:58.274550 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:58.274784 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.274810 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 7 D0713 00:07:58.274823 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:58.274988 786749 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.275011 786749 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0005deb10 8 D0713 00:07:58.275022 786749 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:58.275179 786749 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.275208 786749 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0005deb10 9 D0713 00:07:58.275219 786749 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:58.275356 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.275389 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 10 D0713 00:07:58.275403 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:58.275788 786749 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.275811 786749 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0005deb10 11 D0713 00:07:58.275823 786749 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:58.275949 786749 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.275967 786749 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0005deb10 12 D0713 00:07:58.275977 786749 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:58.275995 786749 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 00:07:58.276013 786749 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler D0713 00:07:58.282636 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.282654 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 13 D0713 00:07:58.282665 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:58.286659 786749 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 00:07:58.286705 786749 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler D0713 00:07:58.294033 786749 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.294068 786749 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0005deb10 14 D0713 00:07:58.294083 786749 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:58.294104 786749 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.294155 786749 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.294193 786749 task_signals.go:204] [ 788: 790] Signal 788, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.294209 786749 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.294233 786749 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.294240 786749 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.294254 786749 task_signals.go:204] [ 788: 791] Signal 788, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.294277 786749 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.294294 786749 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.294300 786749 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.294312 786749 task_signals.go:204] [ 788: 792] Signal 788, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.294324 786749 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.294331 786749 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.294336 786749 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.294349 786749 task_signals.go:204] [ 788: 789] Signal 788, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.294373 786749 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.295738 786749 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.295786 786749 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.295800 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.295833 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.295844 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.295925 786749 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.296444 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.298024 786749 syscalls.go:262] [ 793: 793] Allocating stack with size of 8388608 bytes D0713 00:07:58.298179 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.299492 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.299529 786749 usertrap_amd64.go:106] [ 793: 793] Map a usertrap vma at 60000 D0713 00:07:58.299604 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 1 D0713 00:07:58.299630 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:58.299930 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.299953 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 2 D0713 00:07:58.299964 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:58.300515 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.300540 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 3 D0713 00:07:58.300547 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:58.307044 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.307083 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 4 D0713 00:07:58.307097 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:58.308204 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.308234 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 5 D0713 00:07:58.308243 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:58.308279 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.308292 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 6 D0713 00:07:58.308297 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:58.308562 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.308577 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 7 D0713 00:07:58.308609 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:58.308790 786749 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.308809 786749 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0007c5380 8 D0713 00:07:58.308818 786749 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:58.309039 786749 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.309067 786749 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0007c5380 9 D0713 00:07:58.309077 786749 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:58.309162 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.309172 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 10 D0713 00:07:58.309180 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:58.309356 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.309379 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 11 D0713 00:07:58.309388 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:58.316743 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.316782 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 12 D0713 00:07:58.316795 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:58.320930 786749 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.321010 786749 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0007c5380 13 D0713 00:07:58.321024 786749 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:58.321061 786749 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.321068 786749 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0007c5380 14 D0713 00:07:58.321075 786749 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:58.321089 786749 task_signals.go:470] [ 793: 793] Notified of signal 23 D0713 00:07:58.321120 786749 task_signals.go:220] [ 793: 793] Signal 23: delivering to handler D0713 00:07:58.321301 786749 task_signals.go:470] [ 793: 793] Notified of signal 23 D0713 00:07:58.321335 786749 task_signals.go:220] [ 793: 793] Signal 23: delivering to handler D0713 00:07:58.327238 786749 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.327270 786749 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0007c5380 15 D0713 00:07:58.327284 786749 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:58.327433 786749 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.327480 786749 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.327513 786749 task_signals.go:204] [ 793: 797] Signal 793, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.327511 786749 task_signals.go:204] [ 793: 794] Signal 793, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.327527 786749 task_signals.go:204] [ 793: 795] Signal 793, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.327533 786749 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.327551 786749 task_signals.go:204] [ 793: 796] Signal 793, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.327568 786749 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.327581 786749 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.327595 786749 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.327604 786749 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.327618 786749 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.327627 786749 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.327636 786749 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.327642 786749 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.327662 786749 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.329048 786749 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.329074 786749 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.329083 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 executing program D0713 00:07:58.329127 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.329151 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.329233 786749 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.329980 786749 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.331553 786749 syscalls.go:262] [ 798: 798] Allocating stack with size of 8388608 bytes D0713 00:07:58.331835 786749 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.333988 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.334030 786749 usertrap_amd64.go:106] [ 798: 798] Map a usertrap vma at 6a000 D0713 00:07:58.334147 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 1 D0713 00:07:58.334188 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.334538 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.334559 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 2 D0713 00:07:58.334569 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.335380 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.335405 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 3 D0713 00:07:58.335414 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.343446 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.343488 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 4 D0713 00:07:58.343499 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.344743 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.344774 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 5 D0713 00:07:58.344787 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.344838 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.344846 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 6 D0713 00:07:58.344853 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.345229 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.345259 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 7 D0713 00:07:58.345269 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.345462 786749 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.345486 786749 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000d4b560 8 D0713 00:07:58.345498 786749 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.345763 786749 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.345780 786749 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000d4b560 9 D0713 00:07:58.345794 786749 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.346052 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.346090 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 10 D0713 00:07:58.346103 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.354520 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.354556 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 11 D0713 00:07:58.354570 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.357498 786749 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.357527 786749 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000d4b560 12 D0713 00:07:58.357538 786749 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.357658 786749 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.357674 786749 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000d4b560 13 D0713 00:07:58.357685 786749 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.357728 786749 task_signals.go:470] [ 798: 798] Notified of signal 23 D0713 00:07:58.357818 786749 task_signals.go:220] [ 798: 798] Signal 23: delivering to handler D0713 00:07:58.365817 786749 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.365859 786749 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000d4b560 14 D0713 00:07:58.365876 786749 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.365943 786749 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.366059 786749 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.366082 786749 task_signals.go:204] [ 798: 803] Signal 798, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.366094 786749 task_exit.go:204] [ 798: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.366103 786749 task_exit.go:204] [ 798: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.366109 786749 task_exit.go:204] [ 798: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.366126 786749 task_signals.go:204] [ 798: 800] Signal 798, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.366144 786749 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.366150 786749 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.366153 786749 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.366162 786749 task_signals.go:204] [ 798: 799] Signal 798, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.366197 786749 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.366204 786749 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.366210 786749 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.366223 786749 task_signals.go:204] [ 798: 801] Signal 798, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.366242 786749 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.366248 786749 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.366262 786749 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.366276 786749 task_signals.go:204] [ 798: 802] Signal 798, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.366286 786749 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.367746 786749 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.367782 786749 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.367793 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.367818 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.367828 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.367948 786749 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.368661 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.370053 786749 syscalls.go:262] [ 804: 804] Allocating stack with size of 8388608 bytes D0713 00:07:58.370162 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.371213 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.371249 786749 usertrap_amd64.go:106] [ 804: 804] Map a usertrap vma at 6a000 D0713 00:07:58.371324 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 1 D0713 00:07:58.371354 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.371605 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.371620 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 2 D0713 00:07:58.371626 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.372303 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.372327 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 3 D0713 00:07:58.372342 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.379365 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.379394 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 4 D0713 00:07:58.379406 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.380718 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.380755 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 5 D0713 00:07:58.380773 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.380824 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.380842 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 6 D0713 00:07:58.380866 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.381341 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.381369 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 7 D0713 00:07:58.381380 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.381584 786749 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.381617 786749 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001195980 8 D0713 00:07:58.381629 786749 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.381882 786749 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.381906 786749 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001195980 9 D0713 00:07:58.381919 786749 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.381953 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.381970 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 10 D0713 00:07:58.381980 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.390178 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.390212 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 11 D0713 00:07:58.390224 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.393521 786749 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.393564 786749 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001195980 12 D0713 00:07:58.393579 786749 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.393599 786749 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.393606 786749 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001195980 13 D0713 00:07:58.393614 786749 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.393634 786749 task_signals.go:470] [ 804: 804] Notified of signal 23 D0713 00:07:58.393724 786749 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler I0713 00:07:58.402910 786749 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 00:07:58.403006 786749 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.403021 786749 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001195980 14 D0713 00:07:58.403037 786749 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.403090 786749 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.403137 786749 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.403159 786749 task_signals.go:204] [ 804: 808] Signal 804, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.403165 786749 task_signals.go:204] [ 804: 806] Signal 804, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.403166 786749 task_signals.go:204] [ 804: 805] Signal 804, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.403229 786749 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.403274 786749 task_signals.go:204] [ 804: 807] Signal 804, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.403290 786749 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.403306 786749 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.403319 786749 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.403326 786749 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.403330 786749 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.403338 786749 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.403345 786749 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.403366 786749 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.403378 786749 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.405089 786749 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.405123 786749 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.405139 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.405240 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.405305 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.405350 786749 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.405507 786749 task_signals.go:470] [ 6: 15] Notified of signal 23 D0713 00:07:58.405613 786749 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:07:58.406092 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.407647 786749 syscalls.go:262] [ 809: 809] Allocating stack with size of 8388608 bytes D0713 00:07:58.407803 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.409394 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.409435 786749 usertrap_amd64.go:106] [ 809: 809] Map a usertrap vma at 61000 D0713 00:07:58.409539 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 1 D0713 00:07:58.409581 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.410000 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.410027 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 2 D0713 00:07:58.410038 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.410458 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.410485 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 3 D0713 00:07:58.410491 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.416153 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.416181 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 4 D0713 00:07:58.416191 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.417410 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.417440 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 5 D0713 00:07:58.417449 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.417512 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.417525 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 6 D0713 00:07:58.417530 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.417843 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.417860 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 7 D0713 00:07:58.417866 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.418024 786749 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.418044 786749 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000bc2ed0 8 D0713 00:07:58.418055 786749 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.418594 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.418627 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 9 D0713 00:07:58.418640 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.418669 786749 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.418675 786749 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000bc2ed0 10 D0713 00:07:58.418688 786749 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.426507 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.426541 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 11 D0713 00:07:58.426555 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.429434 786749 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.429470 786749 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000bc2ed0 12 D0713 00:07:58.429485 786749 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.429763 786749 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.429791 786749 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000bc2ed0 13 D0713 00:07:58.429805 786749 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.429849 786749 task_signals.go:470] [ 809: 809] Notified of signal 23 D0713 00:07:58.429989 786749 task_signals.go:220] [ 809: 809] Signal 23: delivering to handler I0713 00:07:58.438112 786749 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 00:07:58.438194 786749 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.438206 786749 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000bc2ed0 14 D0713 00:07:58.438217 786749 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.438364 786749 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.438396 786749 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.438413 786749 task_signals.go:204] [ 809: 810] Signal 809, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.438428 786749 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.438434 786749 task_signals.go:204] [ 809: 812] Signal 809, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.438446 786749 task_signals.go:204] [ 809: 814] Signal 809, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.438472 786749 task_signals.go:204] [ 809: 811] Signal 809, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.438486 786749 task_signals.go:204] [ 809: 813] Signal 809, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.438533 786749 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.438564 786749 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.438598 786749 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.438638 786749 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.438647 786749 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.438661 786749 task_exit.go:204] [ 809: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.438669 786749 task_exit.go:204] [ 809: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.438675 786749 task_exit.go:204] [ 809: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.438693 786749 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.438701 786749 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.438707 786749 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.438728 786749 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.440152 786749 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.440187 786749 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.440211 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.440240 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.440311 786749 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.440980 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.442490 786749 syscalls.go:262] [ 815: 815] Allocating stack with size of 8388608 bytes D0713 00:07:58.442615 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.444093 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.444130 786749 usertrap_amd64.go:106] [ 815: 815] Map a usertrap vma at 62000 D0713 00:07:58.444226 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 1 D0713 00:07:58.444245 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:58.444503 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.444525 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 2 D0713 00:07:58.444532 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:58.445456 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.445496 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 3 D0713 00:07:58.445514 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:58.452105 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.452170 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 4 D0713 00:07:58.452184 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:58.453415 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.453434 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 5 D0713 00:07:58.453445 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:58.453517 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.453530 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 6 D0713 00:07:58.453538 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:58.453723 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.453739 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 7 D0713 00:07:58.453745 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:58.453837 786749 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.453856 786749 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000e58ea0 8 D0713 00:07:58.453866 786749 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:58.454093 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.454112 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 9 D0713 00:07:58.454185 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:58.454235 786749 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.454245 786749 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000e58ea0 10 D0713 00:07:58.454255 786749 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:58.461412 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.461437 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 11 D0713 00:07:58.461446 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:58.464439 786749 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.464459 786749 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000e58ea0 12 D0713 00:07:58.464472 786749 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:58.464506 786749 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.464524 786749 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000e58ea0 13 D0713 00:07:58.464533 786749 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:58.464643 786749 task_signals.go:470] [ 815: 815] Notified of signal 23 D0713 00:07:58.464765 786749 task_signals.go:220] [ 815: 815] Signal 23: delivering to handler I0713 00:07:58.472193 786749 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 00:07:58.472293 786749 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.472314 786749 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000e58ea0 14 D0713 00:07:58.472325 786749 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:58.472364 786749 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.472391 786749 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.472410 786749 task_signals.go:204] [ 815: 816] Signal 815, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.472425 786749 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.472432 786749 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.472438 786749 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.472461 786749 task_signals.go:204] [ 815: 817] Signal 815, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.472480 786749 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.472488 786749 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.472498 786749 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.472511 786749 task_signals.go:204] [ 815: 818] Signal 815, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.472520 786749 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.472533 786749 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.472548 786749 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.472529 786749 task_signals.go:204] [ 815: 819] Signal 815, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.472608 786749 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.474219 786749 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.474260 786749 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.474272 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.474330 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.474359 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.474481 786749 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.474851 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.476157 786749 syscalls.go:262] [ 820: 820] Allocating stack with size of 8388608 bytes D0713 00:07:58.476237 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.477153 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.477190 786749 usertrap_amd64.go:106] [ 820: 820] Map a usertrap vma at 68000 D0713 00:07:58.477253 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 1 D0713 00:07:58.477274 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:58.477619 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.477644 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 2 D0713 00:07:58.477654 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:58.478358 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.478380 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 3 D0713 00:07:58.478388 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:58.485703 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.485726 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 4 D0713 00:07:58.485741 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:58.486970 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.486986 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 5 D0713 00:07:58.486996 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:58.487050 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.487072 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 6 D0713 00:07:58.487081 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:58.487361 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.487385 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 7 D0713 00:07:58.487393 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:58.487501 786749 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.487562 786749 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc00206e2a0 8 D0713 00:07:58.487604 786749 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:58.487812 786749 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.487827 786749 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc00206e2a0 9 D0713 00:07:58.487836 786749 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:58.487905 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.487917 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 10 D0713 00:07:58.487925 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:58.495786 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.495860 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 11 D0713 00:07:58.495892 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:58.498957 786749 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.499142 786749 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc00206e2a0 12 D0713 00:07:58.499219 786749 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:58.499473 786749 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.499497 786749 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc00206e2a0 13 D0713 00:07:58.499505 786749 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:58.499586 786749 task_signals.go:470] [ 820: 820] Notified of signal 23 D0713 00:07:58.499700 786749 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler D0713 00:07:58.508251 786749 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.508348 786749 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc00206e2a0 14 D0713 00:07:58.508379 786749 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:58.508526 786749 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.508566 786749 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.508567 786749 task_signals.go:204] [ 820: 823] Signal 820, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.508588 786749 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.508600 786749 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.508587 786749 task_signals.go:204] [ 820: 822] Signal 820, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.508606 786749 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.508624 786749 task_signals.go:204] [ 820: 821] Signal 820, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.508658 786749 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.508667 786749 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.508673 786749 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.508588 786749 task_signals.go:204] [ 820: 824] Signal 820, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.508684 786749 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.508692 786749 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.508710 786749 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.508719 786749 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.509993 786749 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.510024 786749 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.510033 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.510056 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.510063 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.510161 786749 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.510977 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.512478 786749 syscalls.go:262] [ 825: 825] Allocating stack with size of 8388608 bytes D0713 00:07:58.512685 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.515339 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.515376 786749 usertrap_amd64.go:106] [ 825: 825] Map a usertrap vma at 67000 D0713 00:07:58.515518 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 1 D0713 00:07:58.515549 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:58.517177 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.517243 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 2 D0713 00:07:58.517271 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:58.517824 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.517850 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 3 D0713 00:07:58.517862 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:58.524838 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.524869 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 4 D0713 00:07:58.524881 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:58.525996 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.526024 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 5 D0713 00:07:58.526036 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:58.526106 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.526123 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 6 D0713 00:07:58.526133 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:58.526521 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.526543 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 7 D0713 00:07:58.526553 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:58.526703 786749 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.526739 786749 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000bc32c0 8 D0713 00:07:58.526755 786749 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:58.526973 786749 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.526999 786749 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000bc32c0 9 D0713 00:07:58.527010 786749 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:58.527244 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.527354 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 10 D0713 00:07:58.527369 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:58.536650 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.536693 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 11 D0713 00:07:58.536709 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:58.539676 786749 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.539698 786749 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000bc32c0 12 D0713 00:07:58.539713 786749 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:58.539951 786749 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.540002 786749 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000bc32c0 13 D0713 00:07:58.540022 786749 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:58.540077 786749 task_signals.go:470] [ 825: 825] Notified of signal 23 D0713 00:07:58.540171 786749 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler I0713 00:07:58.548170 786749 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 00:07:58.548297 786749 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.548309 786749 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000bc32c0 14 D0713 00:07:58.548321 786749 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:58.548365 786749 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.548402 786749 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.548425 786749 task_signals.go:204] [ 825: 826] Signal 825, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.548437 786749 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.548442 786749 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.548446 786749 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.548462 786749 task_signals.go:204] [ 825: 827] Signal 825, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.548469 786749 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.548474 786749 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.548480 786749 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.548495 786749 task_signals.go:204] [ 825: 829] Signal 825, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.548507 786749 task_signals.go:204] [ 825: 828] Signal 825, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.548519 786749 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.548539 786749 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.548549 786749 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.548561 786749 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.550133 786749 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.550160 786749 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.550178 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.553085 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.553130 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.553261 786749 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.554129 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.555497 786749 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0713 00:07:58.555590 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.556563 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.556613 786749 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 66000 D0713 00:07:58.556693 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 1 D0713 00:07:58.556730 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:58.557128 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.557161 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 2 D0713 00:07:58.557178 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:58.557899 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.557933 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 3 D0713 00:07:58.557945 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:58.566270 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.566300 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 4 D0713 00:07:58.566315 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:58.567523 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.567539 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 5 D0713 00:07:58.567551 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:58.567772 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.567812 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 6 D0713 00:07:58.567822 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:58.568371 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.568393 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 7 D0713 00:07:58.568405 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:58.568707 786749 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.568729 786749 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000e59470 8 D0713 00:07:58.568740 786749 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:58.568996 786749 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.569038 786749 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000e59470 9 D0713 00:07:58.569054 786749 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:58.569343 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.569370 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 10 D0713 00:07:58.569382 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:58.577632 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.577672 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 11 D0713 00:07:58.577686 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:58.581336 786749 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.581365 786749 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000e59470 12 D0713 00:07:58.581378 786749 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:58.581539 786749 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.581609 786749 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000e59470 13 D0713 00:07:58.581622 786749 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:58.581656 786749 task_signals.go:470] [ 830: 830] Notified of signal 23 D0713 00:07:58.581719 786749 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler I0713 00:07:58.589950 786749 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 00:07:58.590023 786749 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.590035 786749 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000e59470 14 D0713 00:07:58.590046 786749 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:58.590076 786749 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.590114 786749 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.590112 786749 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.590133 786749 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.590129 786749 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.590144 786749 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.590223 786749 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.590253 786749 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.590266 786749 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.590279 786749 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.590292 786749 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.590298 786749 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.590310 786749 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.590318 786749 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.590326 786749 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.590336 786749 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.591690 786749 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.591731 786749 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.591747 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.591775 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.591797 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.591882 786749 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.592304 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.593703 786749 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0713 00:07:58.593781 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.595029 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.595061 786749 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 6a000 D0713 00:07:58.595121 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 1 D0713 00:07:58.595144 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.595499 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.595562 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 2 D0713 00:07:58.595583 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.596087 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.596108 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 3 D0713 00:07:58.596114 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.601773 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.601821 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 4 D0713 00:07:58.601833 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.602895 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.602934 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 5 D0713 00:07:58.602960 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.603134 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.603155 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 6 D0713 00:07:58.603164 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.603686 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.603715 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 7 D0713 00:07:58.603726 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.604009 786749 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.604034 786749 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0020ba240 8 D0713 00:07:58.604043 786749 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.604257 786749 usertrap_amd64.go:212] [ 835: 837] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.604282 786749 usertrap_amd64.go:122] [ 835: 837] Allocate a new trap: 0xc0020ba240 9 D0713 00:07:58.604292 786749 usertrap_amd64.go:225] [ 835: 837] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.604529 786749 usertrap_amd64.go:212] [ 835: 838] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.604554 786749 usertrap_amd64.go:122] [ 835: 838] Allocate a new trap: 0xc0020ba240 10 D0713 00:07:58.604565 786749 usertrap_amd64.go:225] [ 835: 838] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.604600 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.604608 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 11 D0713 00:07:58.604644 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.612859 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.612886 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 12 D0713 00:07:58.612920 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.615215 786749 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.615242 786749 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0020ba240 13 D0713 00:07:58.615255 786749 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.615275 786749 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.615285 786749 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0020ba240 14 D0713 00:07:58.615296 786749 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.615316 786749 task_signals.go:470] [ 835: 835] Notified of signal 23 D0713 00:07:58.615362 786749 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0713 00:07:58.623206 786749 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.623245 786749 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0020ba240 15 D0713 00:07:58.623260 786749 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 00:07:58.623320 786749 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.623352 786749 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.623368 786749 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.623380 786749 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.623393 786749 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.623422 786749 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.623430 786749 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.623452 786749 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.623476 786749 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.623482 786749 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.623496 786749 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.623515 786749 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.623523 786749 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.623528 786749 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.623542 786749 task_signals.go:204] [ 835: 840] Signal 835, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.623553 786749 task_exit.go:204] [ 835: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.623560 786749 task_exit.go:204] [ 835: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.623566 786749 task_exit.go:204] [ 835: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.623578 786749 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.623588 786749 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.624925 786749 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.625021 786749 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.625036 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.625095 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.625204 786749 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.625887 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.627253 786749 syscalls.go:262] [ 841: 841] Allocating stack with size of 8388608 bytes D0713 00:07:58.627457 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.628664 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.628698 786749 usertrap_amd64.go:106] [ 841: 841] Map a usertrap vma at 61000 D0713 00:07:58.628766 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 1 D0713 00:07:58.628791 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.629439 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.629467 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 2 D0713 00:07:58.629476 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.630316 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.630342 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 3 D0713 00:07:58.630353 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.637467 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.637494 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 4 D0713 00:07:58.637506 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.638809 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.638836 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 5 D0713 00:07:58.638847 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.638917 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.638932 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 6 D0713 00:07:58.638944 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.639321 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.639409 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 7 D0713 00:07:58.639426 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.639647 786749 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.639672 786749 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc000bc3860 8 D0713 00:07:58.639684 786749 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.639882 786749 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.639914 786749 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc000bc3860 9 D0713 00:07:58.639927 786749 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.640107 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.640294 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 10 D0713 00:07:58.640666 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.648348 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.648383 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 11 D0713 00:07:58.648399 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.651376 786749 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.651398 786749 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc000bc3860 12 D0713 00:07:58.651412 786749 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.651477 786749 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.651490 786749 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc000bc3860 13 D0713 00:07:58.651499 786749 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.651590 786749 task_signals.go:470] [ 841: 841] Notified of signal 23 D0713 00:07:58.651696 786749 task_signals.go:220] [ 841: 841] Signal 23: delivering to handler I0713 00:07:58.660150 786749 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 00:07:58.660240 786749 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.660254 786749 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc000bc3860 14 D0713 00:07:58.660268 786749 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.660334 786749 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.660370 786749 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.660387 786749 task_signals.go:204] [ 841: 844] Signal 841, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.660413 786749 task_signals.go:204] [ 841: 843] Signal 841, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.660392 786749 task_signals.go:204] [ 841: 842] Signal 841, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.660417 786749 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.660460 786749 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.660392 786749 task_signals.go:204] [ 841: 845] Signal 841, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.660468 786749 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.660489 786749 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.660503 786749 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.660510 786749 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.660520 786749 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.660537 786749 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.660544 786749 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.660567 786749 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.662041 786749 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.662071 786749 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.662085 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.662153 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.662177 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.662331 786749 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.662872 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.664156 786749 syscalls.go:262] [ 846: 846] Allocating stack with size of 8388608 bytes D0713 00:07:58.664251 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.665433 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.665467 786749 usertrap_amd64.go:106] [ 846: 846] Map a usertrap vma at 65000 D0713 00:07:58.665553 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 1 D0713 00:07:58.665593 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:58.665975 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.666002 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 2 D0713 00:07:58.666019 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:58.667233 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.667262 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 3 D0713 00:07:58.667274 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:58.673668 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.673700 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 4 D0713 00:07:58.673712 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:58.675109 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.675147 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 5 D0713 00:07:58.675162 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:58.675347 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.675367 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 6 D0713 00:07:58.675373 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:58.675766 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.675820 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 7 D0713 00:07:58.675831 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:58.676058 786749 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.676080 786749 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc0020bab40 8 D0713 00:07:58.676090 786749 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:58.676203 786749 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.676221 786749 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc0020bab40 9 D0713 00:07:58.676231 786749 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:58.676528 786749 usertrap_amd64.go:212] [ 846: 849] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.676559 786749 usertrap_amd64.go:122] [ 846: 849] Allocate a new trap: 0xc0020bab40 10 D0713 00:07:58.676568 786749 usertrap_amd64.go:225] [ 846: 849] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:58.676670 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.676694 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 11 D0713 00:07:58.676706 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:58.683919 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.683949 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 12 D0713 00:07:58.683959 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:58.688258 786749 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.688290 786749 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc0020bab40 13 D0713 00:07:58.688303 786749 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:58.688360 786749 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.688378 786749 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc0020bab40 14 D0713 00:07:58.688387 786749 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:58.688482 786749 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:07:58.688513 786749 task_signals.go:179] [ 846: 846] Restarting syscall 202: interrupted by signal 23 D0713 00:07:58.688549 786749 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler I0713 00:07:58.695221 786749 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 00:07:58.695375 786749 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.695408 786749 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc0020bab40 15 D0713 00:07:58.695428 786749 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 00:07:58.695486 786749 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.695528 786749 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.695527 786749 task_signals.go:204] [ 846: 850] Signal 846, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.695557 786749 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.695558 786749 task_signals.go:204] [ 846: 851] Signal 846, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.695570 786749 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.695575 786749 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.695584 786749 task_signals.go:204] [ 846: 849] Signal 846, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.695607 786749 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.695598 786749 task_signals.go:204] [ 846: 848] Signal 846, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.695616 786749 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.695625 786749 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.695589 786749 task_signals.go:204] [ 846: 847] Signal 846, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.695635 786749 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.695640 786749 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.695643 786749 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.695649 786749 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.695655 786749 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.695659 786749 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.695666 786749 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.697809 786749 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.697831 786749 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.697844 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.697990 786749 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.697954 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.698985 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.700821 786749 syscalls.go:262] [ 852: 852] Allocating stack with size of 8388608 bytes D0713 00:07:58.701014 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.706063 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.706216 786749 usertrap_amd64.go:106] [ 852: 852] Map a usertrap vma at 64000 D0713 00:07:58.706351 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 1 D0713 00:07:58.706410 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.706776 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.706805 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 2 D0713 00:07:58.706817 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.707464 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.707493 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 3 D0713 00:07:58.707506 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.714501 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.714537 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 4 D0713 00:07:58.714555 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:58.715760 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.715793 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 5 D0713 00:07:58.715807 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:58.715867 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.715876 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 6 D0713 00:07:58.715888 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:58.716160 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.716181 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 7 D0713 00:07:58.716191 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:58.716329 786749 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.716355 786749 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc000bc3bf0 8 D0713 00:07:58.716365 786749 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:58.716523 786749 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.716568 786749 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc000bc3bf0 9 D0713 00:07:58.716579 786749 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:58.716794 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.717048 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 10 D0713 00:07:58.717080 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:58.725900 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.725934 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 11 D0713 00:07:58.725953 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:58.728608 786749 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.728636 786749 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc000bc3bf0 12 D0713 00:07:58.728651 786749 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:58.728704 786749 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.728727 786749 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc000bc3bf0 13 D0713 00:07:58.728738 786749 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:58.728768 786749 task_signals.go:470] [ 852: 852] Notified of signal 23 D0713 00:07:58.728791 786749 task_signals.go:220] [ 852: 852] Signal 23: delivering to handler D0713 00:07:58.736925 786749 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.736986 786749 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc000bc3bf0 14 D0713 00:07:58.737000 786749 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:58.737052 786749 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.737083 786749 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.737109 786749 task_signals.go:204] [ 852: 853] Signal 852, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.737133 786749 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.737138 786749 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.737142 786749 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.737154 786749 task_signals.go:204] [ 852: 854] Signal 852, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.737162 786749 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.737166 786749 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.737170 786749 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.737178 786749 task_signals.go:204] [ 852: 855] Signal 852, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.737185 786749 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.737189 786749 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.737193 786749 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.737204 786749 task_signals.go:204] [ 852: 856] Signal 852, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.737211 786749 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.738535 786749 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.738549 786749 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.738559 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.738607 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.738665 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.738772 786749 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.739355 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.740759 786749 syscalls.go:262] [ 857: 857] Allocating stack with size of 8388608 bytes D0713 00:07:58.740865 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.743032 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.743073 786749 usertrap_amd64.go:106] [ 857: 857] Map a usertrap vma at 65000 D0713 00:07:58.743190 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 1 D0713 00:07:58.743237 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:58.743597 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.743621 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 2 D0713 00:07:58.743630 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:58.744338 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.744367 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 3 D0713 00:07:58.744377 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:58.749220 786749 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0713 00:07:58.750813 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.750841 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 4 D0713 00:07:58.750853 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:58.751848 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.751872 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 5 D0713 00:07:58.751887 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:58.751952 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.751972 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 6 D0713 00:07:58.751981 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:58.752358 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.752380 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 7 D0713 00:07:58.752389 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:58.752575 786749 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.752608 786749 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000bc3c50 8 D0713 00:07:58.752622 786749 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:58.752872 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.752899 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 9 D0713 00:07:58.752910 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:58.753005 786749 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.753036 786749 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000bc3c50 10 D0713 00:07:58.753048 786749 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:58.762300 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.762326 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 11 D0713 00:07:58.762335 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:58.764834 786749 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.764873 786749 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000bc3c50 12 D0713 00:07:58.764886 786749 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:58.764935 786749 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.765034 786749 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000bc3c50 13 D0713 00:07:58.765047 786749 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:58.765159 786749 task_signals.go:470] [ 857: 857] Notified of signal 23 D0713 00:07:58.765247 786749 task_signals.go:220] [ 857: 857] Signal 23: delivering to handler D0713 00:07:58.772750 786749 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.772779 786749 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000bc3c50 14 D0713 00:07:58.772791 786749 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:58.772849 786749 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.772876 786749 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.772895 786749 task_signals.go:204] [ 857: 859] Signal 857, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.772912 786749 task_signals.go:204] [ 857: 860] Signal 857, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.772898 786749 task_signals.go:204] [ 857: 858] Signal 857, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.772921 786749 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.772893 786749 task_signals.go:204] [ 857: 861] Signal 857, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.772975 786749 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.772990 786749 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.772995 786749 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.773031 786749 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.773040 786749 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.773045 786749 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.773055 786749 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.773062 786749 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.773073 786749 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.774339 786749 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.774406 786749 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.774479 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.774599 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.774650 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.774801 786749 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.775348 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.776696 786749 syscalls.go:262] [ 862: 862] Allocating stack with size of 8388608 bytes D0713 00:07:58.776800 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.777903 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.777941 786749 usertrap_amd64.go:106] [ 862: 862] Map a usertrap vma at 62000 D0713 00:07:58.778031 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 1 D0713 00:07:58.778059 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:58.778450 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.778482 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 2 D0713 00:07:58.778493 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:58.779111 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.779135 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 3 D0713 00:07:58.779145 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:58.785845 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.785872 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 4 D0713 00:07:58.785885 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:58.786855 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.786887 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 5 D0713 00:07:58.786900 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:58.786941 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.786949 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 6 D0713 00:07:58.786958 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:58.787249 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.787268 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 7 D0713 00:07:58.787274 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:58.787423 786749 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.787466 786749 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc0022be1e0 8 D0713 00:07:58.787481 786749 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:58.787604 786749 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.787620 786749 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc0022be1e0 9 D0713 00:07:58.787631 786749 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b6e0 trap addr 622d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:58.787737 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.787753 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 10 D0713 00:07:58.787762 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:58.787804 786749 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.787813 786749 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc0022be1e0 11 D0713 00:07:58.787835 786749 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46af76 trap addr 62370 ([184 35 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:58.795671 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.795708 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 12 D0713 00:07:58.795719 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:58.800783 786749 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.800808 786749 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc0022be1e0 13 D0713 00:07:58.800819 786749 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:58.800879 786749 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.800908 786749 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc0022be1e0 14 D0713 00:07:58.800926 786749 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:58.801058 786749 task_signals.go:470] [ 862: 862] Notified of signal 23 D0713 00:07:58.801134 786749 task_signals.go:220] [ 862: 862] Signal 23: delivering to handler D0713 00:07:58.806727 786749 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.806789 786749 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc0022be1e0 15 D0713 00:07:58.806800 786749 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 00:07:58.806849 786749 task_exit.go:204] [ 862: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.806919 786749 task_exit.go:204] [ 862: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.806950 786749 task_signals.go:204] [ 862: 866] Signal 862, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.806980 786749 task_exit.go:204] [ 862: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.806989 786749 task_exit.go:204] [ 862: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.806995 786749 task_exit.go:204] [ 862: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.807014 786749 task_signals.go:204] [ 862: 864] Signal 862, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.807015 786749 task_signals.go:204] [ 862: 863] Signal 862, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.807031 786749 task_exit.go:204] [ 862: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.807040 786749 task_exit.go:204] [ 862: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.807047 786749 task_exit.go:204] [ 862: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.807031 786749 task_signals.go:204] [ 862: 865] Signal 862, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.807055 786749 task_exit.go:204] [ 862: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.807062 786749 task_exit.go:204] [ 862: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.807082 786749 task_exit.go:204] [ 862: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.807093 786749 task_exit.go:204] [ 862: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.808663 786749 task_exit.go:204] [ 862: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.808677 786749 task_exit.go:204] [ 862: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.808690 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.809021 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.809128 786749 task_exit.go:204] [ 862: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.809449 786749 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:58.809484 786749 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:58.809868 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.811361 786749 syscalls.go:262] [ 867: 867] Allocating stack with size of 8388608 bytes D0713 00:07:58.811462 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.811881 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.811919 786749 usertrap_amd64.go:106] [ 867: 867] Map a usertrap vma at 61000 D0713 00:07:58.812017 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 1 D0713 00:07:58.812058 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.812284 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.812307 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 2 D0713 00:07:58.812315 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.812722 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.812755 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 3 D0713 00:07:58.812771 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.819650 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.819681 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 4 D0713 00:07:58.819693 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.820895 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.820972 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 5 D0713 00:07:58.820988 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.821077 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.821094 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 6 D0713 00:07:58.821106 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.821499 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.821521 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 7 D0713 00:07:58.821531 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.821653 786749 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.821710 786749 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00206f470 8 D0713 00:07:58.821766 786749 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.822144 786749 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.822168 786749 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00206f470 9 D0713 00:07:58.822185 786749 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.822340 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.822365 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 10 D0713 00:07:58.822376 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.830463 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.830491 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 11 D0713 00:07:58.830502 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.835297 786749 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.835314 786749 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00206f470 12 D0713 00:07:58.835381 786749 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.835406 786749 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.835423 786749 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00206f470 13 D0713 00:07:58.835432 786749 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.835456 786749 task_signals.go:470] [ 867: 867] Notified of signal 23 D0713 00:07:58.835822 786749 task_signals.go:220] [ 867: 867] Signal 23: delivering to handler D0713 00:07:58.844136 786749 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.844158 786749 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00206f470 14 D0713 00:07:58.844178 786749 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.844248 786749 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844265 786749 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844287 786749 task_signals.go:204] [ 867: 871] Signal 867, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844279 786749 task_signals.go:204] [ 867: 870] Signal 867, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844302 786749 task_signals.go:204] [ 867: 868] Signal 867, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844316 786749 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844331 786749 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844331 786749 task_signals.go:204] [ 867: 869] Signal 867, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844340 786749 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844349 786749 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844472 786749 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844489 786749 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.844502 786749 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844507 786749 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.844515 786749 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844520 786749 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.845912 786749 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.845949 786749 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.845963 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.845992 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.846002 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.846169 786749 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.846274 786749 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:58.846322 786749 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:58.846775 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.848041 786749 syscalls.go:262] [ 872: 872] Allocating stack with size of 8388608 bytes D0713 00:07:58.848137 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.852478 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.852852 786749 usertrap_amd64.go:106] [ 872: 872] Map a usertrap vma at 69000 D0713 00:07:58.853168 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 1 D0713 00:07:58.853248 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:58.853680 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.853703 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 2 D0713 00:07:58.853714 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:58.854225 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.854244 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 3 D0713 00:07:58.854255 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:58.860014 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.860070 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 4 D0713 00:07:58.860135 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:58.861236 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.861256 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 5 D0713 00:07:58.861263 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:58.861284 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.861288 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 6 D0713 00:07:58.861292 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:58.861476 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.861493 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 7 D0713 00:07:58.861502 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:58.861598 786749 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.861620 786749 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc0022be660 8 D0713 00:07:58.861629 786749 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:58.861850 786749 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.861873 786749 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc0022be660 9 D0713 00:07:58.861883 786749 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:58.861894 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.861900 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 10 D0713 00:07:58.861907 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:58.868796 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.868818 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 11 D0713 00:07:58.868826 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:58.872482 786749 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.872517 786749 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc0022be660 12 D0713 00:07:58.872530 786749 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:58.872612 786749 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.872639 786749 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc0022be660 13 D0713 00:07:58.872651 786749 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:58.872698 786749 task_signals.go:470] [ 872: 872] Notified of signal 23 D0713 00:07:58.872768 786749 task_signals.go:220] [ 872: 872] Signal 23: delivering to handler D0713 00:07:58.878663 786749 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.878685 786749 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc0022be660 14 D0713 00:07:58.878719 786749 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:58.878778 786749 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.878799 786749 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.878817 786749 task_signals.go:204] [ 872: 874] Signal 872, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.878841 786749 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.878850 786749 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.878856 786749 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.878820 786749 task_signals.go:204] [ 872: 875] Signal 872, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.878869 786749 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.878875 786749 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.878881 786749 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.878818 786749 task_signals.go:204] [ 872: 876] Signal 872, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.878890 786749 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.878902 786749 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.878908 786749 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.878842 786749 task_signals.go:204] [ 872: 873] Signal 872, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.878954 786749 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.880210 786749 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.880242 786749 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.880261 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.880287 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.880308 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.880425 786749 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.880811 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.882225 786749 syscalls.go:262] [ 877: 877] Allocating stack with size of 8388608 bytes D0713 00:07:58.882325 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.883085 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.883121 786749 usertrap_amd64.go:106] [ 877: 877] Map a usertrap vma at 63000 D0713 00:07:58.883221 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 1 D0713 00:07:58.883246 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:58.883678 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.883714 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 2 D0713 00:07:58.883728 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:58.884371 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.884393 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 3 D0713 00:07:58.884404 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:58.890303 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.890326 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 4 D0713 00:07:58.890335 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:58.891306 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.891330 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 5 D0713 00:07:58.891341 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:58.891401 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.891419 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 6 D0713 00:07:58.891427 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:58.891636 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.891651 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 7 D0713 00:07:58.891656 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:58.891774 786749 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.891789 786749 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0022be480 8 D0713 00:07:58.891795 786749 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:58.891932 786749 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.891957 786749 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0022be480 9 D0713 00:07:58.891971 786749 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:58.892021 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.892041 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 10 D0713 00:07:58.892051 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:58.899741 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.899769 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 11 D0713 00:07:58.899783 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:58.902400 786749 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.902455 786749 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0022be480 12 D0713 00:07:58.902470 786749 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:58.902494 786749 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.902562 786749 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0022be480 13 D0713 00:07:58.902573 786749 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:58.902654 786749 task_signals.go:470] [ 877: 877] Notified of signal 23 D0713 00:07:58.902721 786749 task_signals.go:220] [ 877: 877] Signal 23: delivering to handler D0713 00:07:58.911380 786749 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.911405 786749 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0022be480 14 D0713 00:07:58.911416 786749 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:58.911463 786749 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911488 786749 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911514 786749 task_signals.go:204] [ 877: 880] Signal 877, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911529 786749 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911547 786749 task_signals.go:204] [ 877: 881] Signal 877, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911556 786749 task_signals.go:204] [ 877: 879] Signal 877, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911572 786749 task_signals.go:204] [ 877: 878] Signal 877, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911592 786749 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911599 786749 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.911617 786749 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911636 786749 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911642 786749 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.911652 786749 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911659 786749 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911665 786749 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.911673 786749 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.912865 786749 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.912890 786749 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.912919 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.912984 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.913008 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.913221 786749 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.913787 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.915221 786749 syscalls.go:262] [ 882: 882] Allocating stack with size of 8388608 bytes D0713 00:07:58.915475 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.920545 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.920575 786749 usertrap_amd64.go:106] [ 882: 882] Map a usertrap vma at 63000 D0713 00:07:58.920661 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 1 D0713 00:07:58.920691 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:58.921333 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.921356 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 2 D0713 00:07:58.921367 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:58.922048 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.922073 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 3 D0713 00:07:58.922085 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:58.928260 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.928291 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 4 D0713 00:07:58.928302 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:58.929428 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.929456 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 5 D0713 00:07:58.929467 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:58.929501 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.929518 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 6 D0713 00:07:58.929527 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:58.929700 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.929713 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 7 D0713 00:07:58.929721 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:58.929856 786749 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.929878 786749 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc0020ba1b0 8 D0713 00:07:58.929904 786749 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:58.930159 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.930181 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 9 D0713 00:07:58.930195 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:58.930282 786749 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.930302 786749 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc0020ba1b0 10 D0713 00:07:58.930312 786749 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:58.937509 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.937567 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 11 D0713 00:07:58.937586 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:58.940572 786749 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.940599 786749 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc0020ba1b0 12 D0713 00:07:58.940616 786749 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:58.940662 786749 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.940677 786749 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc0020ba1b0 13 D0713 00:07:58.940687 786749 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:58.940704 786749 task_signals.go:470] [ 882: 882] Notified of signal 23 D0713 00:07:58.941018 786749 task_signals.go:220] [ 882: 882] Signal 23: delivering to handler D0713 00:07:58.948431 786749 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.948461 786749 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc0020ba1b0 14 D0713 00:07:58.948475 786749 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:58.948513 786749 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.948541 786749 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.948566 786749 task_signals.go:204] [ 882: 883] Signal 882, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.948585 786749 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.948591 786749 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.948597 786749 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.948613 786749 task_signals.go:204] [ 882: 884] Signal 882, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.948625 786749 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.948632 786749 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.948637 786749 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.948655 786749 task_signals.go:204] [ 882: 885] Signal 882, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.948675 786749 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.948694 786749 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.948699 786749 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.948712 786749 task_signals.go:204] [ 882: 886] Signal 882, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.948721 786749 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.950439 786749 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.950473 786749 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.950495 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.950549 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.950569 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.950724 786749 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.951332 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.953032 786749 syscalls.go:262] [ 887: 887] Allocating stack with size of 8388608 bytes D0713 00:07:58.953172 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.954006 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.954031 786749 usertrap_amd64.go:106] [ 887: 887] Map a usertrap vma at 6a000 D0713 00:07:58.954117 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 1 D0713 00:07:58.954157 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.954514 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.954540 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 2 D0713 00:07:58.954551 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.955008 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.955031 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 3 D0713 00:07:58.955039 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.966079 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.966105 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 4 D0713 00:07:58.966117 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.967260 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.967285 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 5 D0713 00:07:58.967296 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.967334 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.967341 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 6 D0713 00:07:58.967349 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.967555 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.967582 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 7 D0713 00:07:58.967591 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.967797 786749 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.967828 786749 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc001340330 8 D0713 00:07:58.967839 786749 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.968201 786749 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.968218 786749 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc001340330 9 D0713 00:07:58.968230 786749 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.968270 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.968287 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 10 D0713 00:07:58.968297 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.968565 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.968608 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 11 D0713 00:07:58.968630 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.969125 786749 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.969143 786749 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc001340330 12 D0713 00:07:58.969154 786749 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.969230 786749 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.969256 786749 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc001340330 13 D0713 00:07:58.969268 786749 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.969296 786749 task_signals.go:470] [ 887: 887] Notified of signal 23 D0713 00:07:58.969337 786749 task_signals.go:220] [ 887: 887] Signal 23: delivering to handler D0713 00:07:58.976155 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.976181 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 14 D0713 00:07:58.976193 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.979897 786749 task_signals.go:470] [ 887: 887] Notified of signal 23 D0713 00:07:58.979938 786749 task_signals.go:220] [ 887: 887] Signal 23: delivering to handler D0713 00:07:58.986113 786749 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.986136 786749 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc001340330 15 D0713 00:07:58.986146 786749 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 00:07:58.986197 786749 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.986226 786749 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.986244 786749 task_signals.go:204] [ 887: 888] Signal 887, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.986242 786749 task_signals.go:204] [ 887: 889] Signal 887, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.986254 786749 task_signals.go:204] [ 887: 891] Signal 887, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.986280 786749 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.986299 786749 task_signals.go:204] [ 887: 890] Signal 887, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.986313 786749 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.986320 786749 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.986336 786749 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.986354 786749 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.986364 786749 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.986381 786749 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.986402 786749 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.986407 786749 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.986416 786749 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.987730 786749 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.987756 786749 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.987779 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.987820 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.987831 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.988016 786749 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.988581 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.989885 786749 syscalls.go:262] [ 892: 892] Allocating stack with size of 8388608 bytes D0713 00:07:58.990026 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.991368 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.991396 786749 usertrap_amd64.go:106] [ 892: 892] Map a usertrap vma at 63000 D0713 00:07:58.991521 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 1 D0713 00:07:58.991551 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:58.991797 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.991813 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 2 D0713 00:07:58.991823 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:58.992297 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.992320 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 3 D0713 00:07:58.992330 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:58.997932 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.997990 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 4 D0713 00:07:58.998010 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:58.999344 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.999375 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 5 D0713 00:07:58.999386 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:58.999433 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.999440 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 6 D0713 00:07:58.999448 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:58.999833 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.999846 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 7 D0713 00:07:58.999855 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:58.999986 786749 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.000012 786749 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001340960 8 D0713 00:07:59.000022 786749 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.000208 786749 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.000224 786749 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001340960 9 D0713 00:07:59.000233 786749 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.000409 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.000434 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 10 D0713 00:07:59.000444 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.009202 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.009228 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 11 D0713 00:07:59.009238 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.011941 786749 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.011964 786749 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001340960 12 D0713 00:07:59.011976 786749 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.012030 786749 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.012045 786749 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001340960 13 D0713 00:07:59.012055 786749 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.012170 786749 task_signals.go:470] [ 892: 892] Notified of signal 23 D0713 00:07:59.012273 786749 task_signals.go:220] [ 892: 892] Signal 23: delivering to handler D0713 00:07:59.020400 786749 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.020435 786749 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001340960 14 D0713 00:07:59.020446 786749 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.020502 786749 task_exit.go:204] [ 892: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.020529 786749 task_exit.go:204] [ 892: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.020571 786749 task_signals.go:204] [ 892: 895] Signal 892, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.020568 786749 task_signals.go:204] [ 892: 894] Signal 892, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.020590 786749 task_exit.go:204] [ 892: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.020622 786749 task_exit.go:204] [ 892: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.020646 786749 task_exit.go:204] [ 892: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.020669 786749 task_signals.go:204] [ 892: 896] Signal 892, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.020683 786749 task_exit.go:204] [ 892: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.020693 786749 task_exit.go:204] [ 892: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.020700 786749 task_exit.go:204] [ 892: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.020712 786749 task_exit.go:204] [ 892: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.020730 786749 task_exit.go:204] [ 892: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.020736 786749 task_exit.go:204] [ 892: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.020749 786749 task_signals.go:204] [ 892: 893] Signal 892, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.020761 786749 task_exit.go:204] [ 892: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.022468 786749 task_exit.go:204] [ 892: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.022496 786749 task_exit.go:204] [ 892: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.022510 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.022540 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.022552 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.022741 786749 task_exit.go:204] [ 892: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.023389 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.024924 786749 syscalls.go:262] [ 897: 897] Allocating stack with size of 8388608 bytes D0713 00:07:59.025128 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.026322 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.026363 786749 usertrap_amd64.go:106] [ 897: 897] Map a usertrap vma at 68000 D0713 00:07:59.026454 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 1 D0713 00:07:59.026518 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.026919 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.026941 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 2 D0713 00:07:59.026952 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.027718 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.027744 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 3 D0713 00:07:59.027757 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.035148 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.035182 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 4 D0713 00:07:59.035194 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.036361 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.036389 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 5 D0713 00:07:59.036400 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.036460 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.036468 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 6 D0713 00:07:59.036473 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.036812 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.036832 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 7 D0713 00:07:59.036840 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.037036 786749 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.037067 786749 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0022beba0 8 D0713 00:07:59.037080 786749 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.037374 786749 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.037400 786749 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0022beba0 9 D0713 00:07:59.037411 786749 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.037579 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.037594 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 10 D0713 00:07:59.037604 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.046181 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.046229 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 11 D0713 00:07:59.046258 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.049101 786749 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.049142 786749 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0022beba0 12 D0713 00:07:59.049160 786749 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.049311 786749 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.049382 786749 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0022beba0 13 D0713 00:07:59.049418 786749 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.049473 786749 task_signals.go:470] [ 897: 897] Notified of signal 23 D0713 00:07:59.049758 786749 task_signals.go:220] [ 897: 897] Signal 23: delivering to handler D0713 00:07:59.058078 786749 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.058130 786749 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0022beba0 14 D0713 00:07:59.058144 786749 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.058204 786749 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.058243 786749 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.058269 786749 task_signals.go:204] [ 897: 900] Signal 897, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.058295 786749 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.058291 786749 task_signals.go:204] [ 897: 898] Signal 897, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.058304 786749 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.058318 786749 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.058263 786749 task_signals.go:204] [ 897: 899] Signal 897, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.058334 786749 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.058358 786749 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.058370 786749 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.058300 786749 task_signals.go:204] [ 897: 901] Signal 897, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.058405 786749 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.058439 786749 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.058447 786749 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.058458 786749 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.060006 786749 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.060047 786749 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.060062 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.060115 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.060325 786749 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.060444 786749 task_signals.go:470] [ 6: 15] Notified of signal 23 D0713 00:07:59.060540 786749 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:07:59.060988 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.062672 786749 syscalls.go:262] [ 902: 902] Allocating stack with size of 8388608 bytes D0713 00:07:59.062796 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.064652 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.064745 786749 usertrap_amd64.go:106] [ 902: 902] Map a usertrap vma at 67000 D0713 00:07:59.064898 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 1 D0713 00:07:59.064971 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.065301 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.065327 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 2 D0713 00:07:59.065340 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.066318 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.066358 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 3 D0713 00:07:59.066373 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.074503 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.074563 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 4 D0713 00:07:59.074580 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.075956 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.075977 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 5 D0713 00:07:59.075989 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.076106 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.076122 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 6 D0713 00:07:59.076134 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.076422 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.076435 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 7 D0713 00:07:59.076451 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.076663 786749 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.076689 786749 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000001ad0 8 D0713 00:07:59.076698 786749 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.077281 786749 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.077331 786749 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000001ad0 9 D0713 00:07:59.077352 786749 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.077399 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.077407 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 10 D0713 00:07:59.077417 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.077491 786749 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.077535 786749 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000001ad0 11 D0713 00:07:59.077545 786749 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.077584 786749 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.077602 786749 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000001ad0 12 D0713 00:07:59.077611 786749 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.077868 786749 task_signals.go:470] [ 902: 905] Notified of signal 23 D0713 00:07:59.077914 786749 task_signals.go:179] [ 902: 905] Restarting syscall 202: interrupted by signal 23 D0713 00:07:59.077927 786749 task_signals.go:220] [ 902: 905] Signal 23: delivering to handler D0713 00:07:59.085363 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.085397 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 13 D0713 00:07:59.085407 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.089303 786749 task_signals.go:470] [ 902: 902] Notified of signal 23 D0713 00:07:59.089368 786749 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0713 00:07:59.096535 786749 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.096576 786749 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000001ad0 14 D0713 00:07:59.096591 786749 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.096639 786749 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.096680 786749 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.096718 786749 task_signals.go:204] [ 902: 904] Signal 902, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.096722 786749 task_signals.go:204] [ 902: 906] Signal 902, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.096749 786749 task_signals.go:204] [ 902: 903] Signal 902, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.096758 786749 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.096769 786749 task_signals.go:204] [ 902: 905] Signal 902, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.096778 786749 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.096782 786749 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.096793 786749 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.096800 786749 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.096804 786749 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.096811 786749 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.096817 786749 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.096828 786749 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.096833 786749 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.098314 786749 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.098353 786749 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.098369 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.098415 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.098528 786749 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.098675 786749 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:59.098738 786749 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:59.099280 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.100800 786749 syscalls.go:262] [ 907: 907] Allocating stack with size of 8388608 bytes D0713 00:07:59.100984 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.102459 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.102523 786749 usertrap_amd64.go:106] [ 907: 907] Map a usertrap vma at 67000 D0713 00:07:59.102778 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 1 D0713 00:07:59.102817 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.103252 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.103282 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 2 D0713 00:07:59.103297 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.104637 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.104668 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 3 D0713 00:07:59.104683 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.111775 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.111861 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 4 D0713 00:07:59.111889 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.113550 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.113578 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 5 D0713 00:07:59.113589 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.113673 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.113695 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 6 D0713 00:07:59.113704 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.114181 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.114208 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 7 D0713 00:07:59.114219 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.114396 786749 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.114431 786749 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000001b60 8 D0713 00:07:59.114442 786749 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.114629 786749 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.114649 786749 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000001b60 9 D0713 00:07:59.114659 786749 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.114755 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.114779 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 10 D0713 00:07:59.114789 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.114820 786749 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.114838 786749 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000001b60 11 D0713 00:07:59.114846 786749 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.122532 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.122562 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 12 D0713 00:07:59.122577 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.125635 786749 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.125689 786749 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000001b60 13 D0713 00:07:59.125704 786749 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.125760 786749 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.125815 786749 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000001b60 14 D0713 00:07:59.125841 786749 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.125892 786749 task_signals.go:470] [ 907: 907] Notified of signal 23 D0713 00:07:59.125970 786749 task_signals.go:220] [ 907: 907] Signal 23: delivering to handler D0713 00:07:59.136751 786749 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.136786 786749 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000001b60 15 D0713 00:07:59.136800 786749 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 00:07:59.136907 786749 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.137011 786749 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.137046 786749 task_signals.go:204] [ 907: 909] Signal 907, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.137075 786749 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.137084 786749 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.137095 786749 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.137116 786749 task_signals.go:204] [ 907: 908] Signal 907, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.137141 786749 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.137149 786749 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.137154 786749 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.137171 786749 task_signals.go:204] [ 907: 911] Signal 907, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.137183 786749 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.137194 786749 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.137217 786749 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.137232 786749 task_signals.go:204] [ 907: 910] Signal 907, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.137251 786749 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.138588 786749 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.138614 786749 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.138628 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.138665 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.138675 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.138900 786749 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.139464 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.141284 786749 syscalls.go:262] [ 912: 912] Allocating stack with size of 8388608 bytes D0713 00:07:59.141412 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.142167 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.142255 786749 usertrap_amd64.go:106] [ 912: 912] Map a usertrap vma at 60000 D0713 00:07:59.142365 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 1 D0713 00:07:59.142420 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.143202 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.143220 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 2 D0713 00:07:59.143232 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.144017 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.144091 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 3 D0713 00:07:59.144110 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.151886 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.151937 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 4 D0713 00:07:59.151952 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.153334 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.153369 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 5 D0713 00:07:59.153389 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.153440 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.153456 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 6 D0713 00:07:59.153462 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.153709 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.153739 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 7 D0713 00:07:59.153768 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.153938 786749 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.153969 786749 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022beff0 8 D0713 00:07:59.153989 786749 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.154158 786749 usertrap_amd64.go:212] [ 912: 914] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.154180 786749 usertrap_amd64.go:122] [ 912: 914] Allocate a new trap: 0xc0022beff0 9 D0713 00:07:59.154193 786749 usertrap_amd64.go:225] [ 912: 914] Apply the binary patch addr 46b6e0 trap addr 602d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.154213 786749 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.154220 786749 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022beff0 10 D0713 00:07:59.154229 786749 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.154259 786749 usertrap_amd64.go:212] [ 912: 914] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.154278 786749 usertrap_amd64.go:122] [ 912: 914] Allocate a new trap: 0xc0022beff0 11 D0713 00:07:59.154287 786749 usertrap_amd64.go:225] [ 912: 914] Apply the binary patch addr 46b57c trap addr 60370 ([184 202 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.163462 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.163494 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 12 D0713 00:07:59.163506 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.166243 786749 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.166292 786749 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022beff0 13 D0713 00:07:59.166308 786749 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.166430 786749 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.166449 786749 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022beff0 14 D0713 00:07:59.166457 786749 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.166475 786749 task_signals.go:470] [ 912: 912] Notified of signal 23 D0713 00:07:59.166522 786749 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0713 00:07:59.175624 786749 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.175663 786749 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022beff0 15 D0713 00:07:59.175679 786749 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:59.175829 786749 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.175887 786749 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.175885 786749 task_signals.go:204] [ 912: 916] Signal 912, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.175919 786749 task_signals.go:204] [ 912: 914] Signal 912, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.175929 786749 task_signals.go:204] [ 912: 915] Signal 912, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.175946 786749 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.175980 786749 task_signals.go:204] [ 912: 913] Signal 912, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.176006 786749 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.176013 786749 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.176028 786749 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.176045 786749 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.176052 786749 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.176061 786749 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.176079 786749 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.176089 786749 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.176119 786749 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.178175 786749 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.178199 786749 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.178216 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.178261 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.178285 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.178408 786749 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.178474 786749 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:59.178525 786749 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:59.179102 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.180556 786749 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0713 00:07:59.180679 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.181312 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.181342 786749 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 62000 D0713 00:07:59.185006 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 1 D0713 00:07:59.185051 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:59.185403 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.185436 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 2 D0713 00:07:59.185449 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:59.185937 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.185964 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 3 D0713 00:07:59.185974 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:59.191643 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.191679 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 4 D0713 00:07:59.191690 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:59.192870 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.192893 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 5 D0713 00:07:59.192903 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:59.192985 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.192995 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 6 D0713 00:07:59.193001 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:59.193282 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.193316 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 7 D0713 00:07:59.193327 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:59.193494 786749 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.193521 786749 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc00206efc0 8 D0713 00:07:59.193533 786749 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:59.193667 786749 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.193692 786749 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc00206efc0 9 D0713 00:07:59.193702 786749 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:59.193739 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.193757 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 10 D0713 00:07:59.193767 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:59.201313 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.201340 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 11 D0713 00:07:59.201349 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:59.205609 786749 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.205633 786749 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc00206efc0 12 D0713 00:07:59.205644 786749 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:59.205703 786749 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.205717 786749 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc00206efc0 13 D0713 00:07:59.205727 786749 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:59.205869 786749 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 00:07:59.205926 786749 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 00:07:59.212713 786749 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.212741 786749 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc00206efc0 14 D0713 00:07:59.212753 786749 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:59.212803 786749 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.212825 786749 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.212852 786749 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.212856 786749 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.212868 786749 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.212888 786749 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.212919 786749 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.212929 786749 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.212975 786749 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.212995 786749 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.213001 786749 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.213017 786749 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.213028 786749 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.213035 786749 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.213040 786749 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.213048 786749 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.214792 786749 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.214823 786749 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.214835 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.214865 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.214876 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.214962 786749 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.215690 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.217114 786749 syscalls.go:262] [ 922: 922] Allocating stack with size of 8388608 bytes D0713 00:07:59.217220 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.218720 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.218777 786749 usertrap_amd64.go:106] [ 922: 922] Map a usertrap vma at 61000 D0713 00:07:59.218849 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 1 D0713 00:07:59.218886 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:59.219102 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.219123 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 2 D0713 00:07:59.219131 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:59.220079 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.220103 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 3 D0713 00:07:59.220112 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:59.226480 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.226560 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 4 D0713 00:07:59.226591 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:59.227924 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.227959 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 5 D0713 00:07:59.227972 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:59.228076 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.228103 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 6 D0713 00:07:59.228125 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:59.228577 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.228602 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 7 D0713 00:07:59.228611 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:59.228756 786749 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.228780 786749 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc0013416e0 8 D0713 00:07:59.228789 786749 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:59.229086 786749 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.229112 786749 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc0013416e0 9 D0713 00:07:59.229121 786749 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:59.229399 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.229428 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 10 D0713 00:07:59.229439 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:59.229483 786749 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.229491 786749 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc0013416e0 11 D0713 00:07:59.229501 786749 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:59.229587 786749 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.229611 786749 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc0013416e0 12 D0713 00:07:59.229620 786749 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:59.229666 786749 task_signals.go:470] [ 922: 925] Notified of signal 23 D0713 00:07:59.229703 786749 task_signals.go:179] [ 922: 925] Restarting syscall 202: interrupted by signal 23 D0713 00:07:59.229715 786749 task_signals.go:220] [ 922: 925] Signal 23: delivering to handler D0713 00:07:59.237746 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.237785 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 13 D0713 00:07:59.237798 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:59.240347 786749 task_signals.go:470] [ 922: 922] Notified of signal 23 D0713 00:07:59.240682 786749 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0713 00:07:59.240896 786749 task_signals.go:470] [ 922: 922] Notified of signal 23 D0713 00:07:59.240972 786749 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0713 00:07:59.250497 786749 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.250527 786749 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc0013416e0 14 D0713 00:07:59.250538 786749 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:59.250580 786749 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.250613 786749 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.250638 786749 task_signals.go:204] [ 922: 925] Signal 922, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.250657 786749 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.250638 786749 task_signals.go:204] [ 922: 923] Signal 922, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.250654 786749 task_signals.go:204] [ 922: 924] Signal 922, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.250667 786749 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.250724 786749 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.250813 786749 task_signals.go:204] [ 922: 926] Signal 922, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.250839 786749 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.250859 786749 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.250872 786749 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.250882 786749 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.250908 786749 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.250924 786749 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.250934 786749 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.252290 786749 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.252320 786749 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.252334 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.252682 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.252782 786749 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.253637 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.254786 786749 syscalls.go:262] [ 927: 927] Allocating stack with size of 8388608 bytes D0713 00:07:59.254917 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.255772 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.255803 786749 usertrap_amd64.go:106] [ 927: 927] Map a usertrap vma at 60000 D0713 00:07:59.255934 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 1 D0713 00:07:59.255966 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.256269 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.256325 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 2 D0713 00:07:59.256345 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.257218 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.257239 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 3 D0713 00:07:59.257263 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.264256 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.264289 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 4 D0713 00:07:59.264302 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.265604 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.265635 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 5 D0713 00:07:59.265648 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.265698 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.265713 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 6 D0713 00:07:59.265722 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.265932 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.265954 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 7 D0713 00:07:59.265962 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.266145 786749 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.266165 786749 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc0022bf4d0 8 D0713 00:07:59.266173 786749 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.266323 786749 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.266343 786749 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc0022bf4d0 9 D0713 00:07:59.266352 786749 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.266418 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.266442 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 10 D0713 00:07:59.266450 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.274161 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.274200 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 11 D0713 00:07:59.274214 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.277037 786749 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.277065 786749 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc0022bf4d0 12 D0713 00:07:59.277074 786749 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.277091 786749 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.277095 786749 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc0022bf4d0 13 D0713 00:07:59.277100 786749 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.277118 786749 task_signals.go:470] [ 927: 927] Notified of signal 23 D0713 00:07:59.277185 786749 task_signals.go:220] [ 927: 927] Signal 23: delivering to handler I0713 00:07:59.285100 786749 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 00:07:59.285156 786749 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.285167 786749 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc0022bf4d0 14 D0713 00:07:59.285181 786749 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.285254 786749 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.285296 786749 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.285295 786749 task_signals.go:204] [ 927: 930] Signal 927, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.285321 786749 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.285322 786749 task_signals.go:204] [ 927: 931] Signal 927, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.285335 786749 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.285355 786749 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.285370 786749 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.285390 786749 task_signals.go:204] [ 927: 929] Signal 927, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.285403 786749 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.285420 786749 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.285428 786749 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.285440 786749 task_signals.go:204] [ 927: 928] Signal 927, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.285452 786749 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.285458 786749 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.285467 786749 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.286822 786749 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.286860 786749 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.286931 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.286976 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.286999 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.287138 786749 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.287676 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.289121 786749 syscalls.go:262] [ 932: 932] Allocating stack with size of 8388608 bytes D0713 00:07:59.289237 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.291036 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.291082 786749 usertrap_amd64.go:106] [ 932: 932] Map a usertrap vma at 60000 D0713 00:07:59.291156 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 1 D0713 00:07:59.291179 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.291430 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.291455 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 2 D0713 00:07:59.291465 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.291898 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.291927 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 3 D0713 00:07:59.291936 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.302101 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.302130 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 4 D0713 00:07:59.302140 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.303113 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.303140 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 5 D0713 00:07:59.303153 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.303188 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.303196 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 6 D0713 00:07:59.303203 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.303443 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.303461 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 7 D0713 00:07:59.303470 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.303789 786749 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.303811 786749 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00206f470 8 D0713 00:07:59.303822 786749 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.304038 786749 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.304048 786749 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00206f470 9 D0713 00:07:59.304056 786749 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.304156 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.304166 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 10 D0713 00:07:59.304174 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.304711 786749 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.304745 786749 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00206f470 11 D0713 00:07:59.304755 786749 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.304840 786749 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.304851 786749 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00206f470 12 D0713 00:07:59.304861 786749 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.304892 786749 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:07:59.305266 786749 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:07:59.316115 786749 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:07:59.316488 786749 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:07:59.317138 786749 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:07:59.317192 786749 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:07:59.319150 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.319182 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 13 D0713 00:07:59.319197 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.328847 786749 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:07:59.328915 786749 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:07:59.333493 786749 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.333526 786749 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00206f470 14 D0713 00:07:59.333538 786749 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.333620 786749 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.333642 786749 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.333666 786749 task_signals.go:204] [ 932: 933] Signal 932, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.333690 786749 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.333699 786749 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.333721 786749 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.333742 786749 task_signals.go:204] [ 932: 934] Signal 932, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.333753 786749 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.333760 786749 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.333765 786749 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.333781 786749 task_signals.go:204] [ 932: 935] Signal 932, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.333791 786749 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.333798 786749 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.333805 786749 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.333818 786749 task_signals.go:204] [ 932: 936] Signal 932, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.333828 786749 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.335266 786749 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.335307 786749 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.335319 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.335348 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.335355 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.335490 786749 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.342717 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.344023 786749 syscalls.go:262] [ 937: 937] Allocating stack with size of 8388608 bytes D0713 00:07:59.344160 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.345339 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.345387 786749 usertrap_amd64.go:106] [ 937: 937] Map a usertrap vma at 63000 D0713 00:07:59.345474 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 1 D0713 00:07:59.345508 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:59.345878 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.345905 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 2 D0713 00:07:59.345919 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:59.346459 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.346478 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 3 D0713 00:07:59.346485 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:59.353126 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.353164 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 4 D0713 00:07:59.353183 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:59.354407 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.354434 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 5 D0713 00:07:59.354446 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:59.354497 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.354506 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 6 D0713 00:07:59.354515 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:59.355034 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.355058 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 7 D0713 00:07:59.355074 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:59.355254 786749 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.355282 786749 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001c9a540 8 D0713 00:07:59.355293 786749 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.355705 786749 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.355729 786749 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001c9a540 9 D0713 00:07:59.355745 786749 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.355766 786749 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.355773 786749 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001c9a540 10 D0713 00:07:59.355781 786749 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.355812 786749 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.355842 786749 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001c9a540 11 D0713 00:07:59.355857 786749 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.365482 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.365529 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 12 D0713 00:07:59.365546 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.366291 786749 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.366321 786749 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001c9a540 13 D0713 00:07:59.366334 786749 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.366373 786749 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.366382 786749 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001c9a540 14 D0713 00:07:59.366391 786749 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.366411 786749 task_signals.go:470] [ 937: 937] Notified of signal 23 D0713 00:07:59.366486 786749 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0713 00:07:59.366609 786749 task_signals.go:481] [ 937: 937] No task notified of signal 23 D0713 00:07:59.366666 786749 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler I0713 00:07:59.378046 786749 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 00:07:59.378247 786749 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.378270 786749 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001c9a540 15 D0713 00:07:59.378290 786749 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:07:59.378349 786749 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.378381 786749 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.378410 786749 task_signals.go:204] [ 937: 938] Signal 937, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.378425 786749 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.378437 786749 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.378443 786749 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.378482 786749 task_signals.go:204] [ 937: 939] Signal 937, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.378504 786749 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.378512 786749 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.378518 786749 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.378532 786749 task_signals.go:204] [ 937: 940] Signal 937, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.378552 786749 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.378560 786749 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.378565 786749 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.378577 786749 task_signals.go:204] [ 937: 941] Signal 937, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.378598 786749 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.380223 786749 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.380262 786749 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.380281 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.380327 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.380341 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.380478 786749 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.381054 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.383376 786749 syscalls.go:262] [ 942: 942] Allocating stack with size of 8388608 bytes D0713 00:07:59.383493 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.385776 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.385821 786749 usertrap_amd64.go:106] [ 942: 942] Map a usertrap vma at 63000 D0713 00:07:59.385931 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 1 D0713 00:07:59.385961 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:59.386583 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.386603 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 2 D0713 00:07:59.386616 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:59.387105 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.387130 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 3 D0713 00:07:59.387139 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:59.394765 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.394806 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 4 D0713 00:07:59.394820 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:59.396064 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.396095 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 5 D0713 00:07:59.396107 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:59.396141 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.396148 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 6 D0713 00:07:59.396155 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:59.396326 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.396345 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 7 D0713 00:07:59.396354 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:59.396525 786749 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.396535 786749 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001565170 8 D0713 00:07:59.396544 786749 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.396699 786749 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.396711 786749 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001565170 9 D0713 00:07:59.396719 786749 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.396791 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.396800 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 10 D0713 00:07:59.396808 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.406950 786749 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.406998 786749 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001565170 11 D0713 00:07:59.407012 786749 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.407246 786749 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.407375 786749 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001565170 12 D0713 00:07:59.407414 786749 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.407531 786749 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 00:07:59.407659 786749 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 00:07:59.409702 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.409728 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 13 D0713 00:07:59.409739 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.418661 786749 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 00:07:59.419729 786749 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler I0713 00:07:59.420126 786749 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 00:07:59.420238 786749 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.420269 786749 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001565170 14 D0713 00:07:59.420288 786749 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.420354 786749 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.420403 786749 task_signals.go:204] [ 942: 944] Signal 942, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.420471 786749 task_signals.go:204] [ 942: 946] Signal 942, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.420478 786749 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.420515 786749 task_signals.go:204] [ 942: 943] Signal 942, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.420520 786749 task_signals.go:204] [ 942: 945] Signal 942, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.420534 786749 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.420563 786749 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.420601 786749 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.420610 786749 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.420630 786749 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.420645 786749 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.420654 786749 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.420663 786749 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.420669 786749 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.420679 786749 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.422329 786749 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.422364 786749 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.422377 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.422442 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.422464 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.422580 786749 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.423155 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.424407 786749 syscalls.go:262] [ 947: 947] Allocating stack with size of 8388608 bytes D0713 00:07:59.424592 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.426027 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.426068 786749 usertrap_amd64.go:106] [ 947: 947] Map a usertrap vma at 66000 D0713 00:07:59.426153 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 1 D0713 00:07:59.426198 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:59.426749 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.426777 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 2 D0713 00:07:59.426788 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:59.427255 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.427278 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 3 D0713 00:07:59.427289 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:59.435163 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.435202 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 4 D0713 00:07:59.435216 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:59.436565 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.436593 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 5 D0713 00:07:59.436604 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:59.436648 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.436702 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 6 D0713 00:07:59.436736 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:59.437040 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.437066 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 7 D0713 00:07:59.437075 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:59.437279 786749 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.437349 786749 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00206fad0 8 D0713 00:07:59.437374 786749 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:59.437597 786749 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.437623 786749 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00206fad0 9 D0713 00:07:59.437634 786749 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:59.437644 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.437651 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 10 D0713 00:07:59.437735 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:59.445402 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.445473 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 11 D0713 00:07:59.445486 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:59.448076 786749 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.448126 786749 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00206fad0 12 D0713 00:07:59.448146 786749 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:59.448175 786749 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.448182 786749 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00206fad0 13 D0713 00:07:59.448190 786749 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:59.448219 786749 task_signals.go:470] [ 947: 947] Notified of signal 23 D0713 00:07:59.448278 786749 task_signals.go:220] [ 947: 947] Signal 23: delivering to handler I0713 00:07:59.455893 786749 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 00:07:59.456013 786749 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.456038 786749 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00206fad0 14 D0713 00:07:59.456050 786749 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:59.456116 786749 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.456145 786749 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.456174 786749 task_signals.go:204] [ 947: 950] Signal 947, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.456166 786749 task_signals.go:204] [ 947: 949] Signal 947, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.456189 786749 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.456200 786749 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.456208 786749 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.456202 786749 task_signals.go:204] [ 947: 948] Signal 947, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.456189 786749 task_signals.go:204] [ 947: 951] Signal 947, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.456223 786749 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.456247 786749 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.456266 786749 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.456284 786749 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.456296 786749 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.456442 786749 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.456470 786749 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.457933 786749 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.457965 786749 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.457981 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.458017 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.458029 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.458104 786749 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.458681 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.460116 786749 syscalls.go:262] [ 952: 952] Allocating stack with size of 8388608 bytes D0713 00:07:59.460265 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.461819 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.461855 786749 usertrap_amd64.go:106] [ 952: 952] Map a usertrap vma at 63000 D0713 00:07:59.461952 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 1 D0713 00:07:59.461979 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:59.462352 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.462388 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 2 D0713 00:07:59.462409 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:59.463036 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.463061 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 3 D0713 00:07:59.463072 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:59.468864 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.468917 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 4 D0713 00:07:59.468932 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:59.470017 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.470045 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 5 D0713 00:07:59.470055 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:59.470106 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.470111 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 6 D0713 00:07:59.470116 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:59.470418 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.470437 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 7 D0713 00:07:59.470452 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:59.470614 786749 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.470634 786749 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc0022bf8c0 8 D0713 00:07:59.470644 786749 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.470806 786749 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.470839 786749 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc0022bf8c0 9 D0713 00:07:59.470853 786749 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.470866 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.470873 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 10 D0713 00:07:59.470964 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.478025 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.478057 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 11 D0713 00:07:59.478069 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.481234 786749 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.481268 786749 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc0022bf8c0 12 D0713 00:07:59.481282 786749 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.481324 786749 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.481354 786749 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc0022bf8c0 13 D0713 00:07:59.481368 786749 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.481408 786749 task_signals.go:470] [ 952: 952] Notified of signal 23 D0713 00:07:59.481556 786749 task_signals.go:220] [ 952: 952] Signal 23: delivering to handler I0713 00:07:59.488460 786749 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 00:07:59.488524 786749 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.488548 786749 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc0022bf8c0 14 D0713 00:07:59.488561 786749 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.488913 786749 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.488981 786749 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.489001 786749 task_signals.go:204] [ 952: 954] Signal 952, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.489013 786749 task_signals.go:204] [ 952: 953] Signal 952, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.489026 786749 task_signals.go:204] [ 952: 956] Signal 952, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.489031 786749 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.489057 786749 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.489081 786749 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.489102 786749 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.489111 786749 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.489117 786749 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.489133 786749 task_signals.go:204] [ 952: 955] Signal 952, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.489146 786749 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.489154 786749 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.489161 786749 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.489172 786749 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.490468 786749 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.490509 786749 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.490524 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.490601 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.490624 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.490777 786749 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.490894 786749 task_signals.go:470] [ 6: 16] Notified of signal 23 D0713 00:07:59.490950 786749 task_signals.go:220] [ 6: 16] Signal 23: delivering to handler D0713 00:07:59.492569 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.494055 786749 syscalls.go:262] [ 957: 957] Allocating stack with size of 8388608 bytes D0713 00:07:59.494176 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.495499 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.495536 786749 usertrap_amd64.go:106] [ 957: 957] Map a usertrap vma at 60000 D0713 00:07:59.495616 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 1 D0713 00:07:59.495642 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.495996 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.496075 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 2 D0713 00:07:59.496152 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.497082 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.497112 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 3 D0713 00:07:59.497123 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.504096 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.504132 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 4 D0713 00:07:59.504149 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.505717 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.505779 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 5 D0713 00:07:59.505809 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.505863 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.505882 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 6 D0713 00:07:59.505889 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.506189 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.506208 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 7 D0713 00:07:59.506217 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.506627 786749 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.506731 786749 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc0022bff50 8 D0713 00:07:59.507206 786749 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.507273 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.507282 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 9 D0713 00:07:59.507291 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.507512 786749 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.507537 786749 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc0022bff50 10 D0713 00:07:59.507548 786749 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.516572 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.516612 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 11 D0713 00:07:59.516631 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.519361 786749 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.519404 786749 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc0022bff50 12 D0713 00:07:59.519419 786749 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.519570 786749 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.519632 786749 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc0022bff50 13 D0713 00:07:59.519651 786749 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.520775 786749 task_signals.go:470] [ 957: 957] Notified of signal 23 D0713 00:07:59.520918 786749 task_signals.go:220] [ 957: 957] Signal 23: delivering to handler I0713 00:07:59.528260 786749 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 00:07:59.528471 786749 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.528505 786749 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc0022bff50 14 D0713 00:07:59.528520 786749 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.528617 786749 task_exit.go:204] [ 957: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.528675 786749 task_exit.go:204] [ 957: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.528709 786749 task_signals.go:204] [ 957: 958] Signal 957, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.528742 786749 task_exit.go:204] [ 957: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.528753 786749 task_exit.go:204] [ 957: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.528872 786749 task_exit.go:204] [ 957: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.528971 786749 task_signals.go:204] [ 957: 961] Signal 957, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.528931 786749 task_signals.go:204] [ 957: 959] Signal 957, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.528990 786749 task_exit.go:204] [ 957: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.529055 786749 task_exit.go:204] [ 957: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.529239 786749 task_exit.go:204] [ 957: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.529295 786749 task_signals.go:204] [ 957: 960] Signal 957, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.529362 786749 task_exit.go:204] [ 957: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.529400 786749 task_exit.go:204] [ 957: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.529445 786749 task_exit.go:204] [ 957: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.529495 786749 task_exit.go:204] [ 957: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.531100 786749 task_exit.go:204] [ 957: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.531171 786749 task_exit.go:204] [ 957: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.531190 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.531267 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.531309 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.531434 786749 task_exit.go:204] [ 957: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.532107 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.533786 786749 syscalls.go:262] [ 962: 962] Allocating stack with size of 8388608 bytes D0713 00:07:59.533937 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.535863 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.535931 786749 usertrap_amd64.go:106] [ 962: 962] Map a usertrap vma at 68000 D0713 00:07:59.536020 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 1 D0713 00:07:59.536055 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.536305 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.536330 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 2 D0713 00:07:59.536341 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.537349 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.537379 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 3 D0713 00:07:59.537390 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.549572 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.549614 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 4 D0713 00:07:59.549634 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.550668 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.550704 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 5 D0713 00:07:59.550714 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.550780 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.550801 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 6 D0713 00:07:59.550810 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.551066 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.551086 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 7 D0713 00:07:59.551092 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.551223 786749 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.551245 786749 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc001565ad0 8 D0713 00:07:59.551256 786749 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.551468 786749 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.551539 786749 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc001565ad0 9 D0713 00:07:59.551599 786749 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.551733 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.551750 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 10 D0713 00:07:59.551761 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.559546 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.559586 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 11 D0713 00:07:59.559598 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.562312 786749 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.562362 786749 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc001565ad0 12 D0713 00:07:59.562382 786749 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.562411 786749 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.562428 786749 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc001565ad0 13 D0713 00:07:59.562437 786749 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.562457 786749 task_signals.go:470] [ 962: 962] Notified of signal 23 D0713 00:07:59.562539 786749 task_signals.go:220] [ 962: 962] Signal 23: delivering to handler I0713 00:07:59.573185 786749 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 00:07:59.573311 786749 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.573342 786749 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc001565ad0 14 D0713 00:07:59.573353 786749 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.573429 786749 task_exit.go:204] [ 962: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.573471 786749 task_exit.go:204] [ 962: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.573485 786749 task_signals.go:204] [ 962: 964] Signal 962, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.573502 786749 task_signals.go:204] [ 962: 965] Signal 962, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.573511 786749 task_exit.go:204] [ 962: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.573525 786749 task_signals.go:204] [ 962: 966] Signal 962, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.573545 786749 task_exit.go:204] [ 962: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.573553 786749 task_exit.go:204] [ 962: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.573573 786749 task_signals.go:204] [ 962: 963] Signal 962, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.573603 786749 task_exit.go:204] [ 962: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.573613 786749 task_exit.go:204] [ 962: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.573623 786749 task_exit.go:204] [ 962: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.573644 786749 task_exit.go:204] [ 962: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.573753 786749 task_exit.go:204] [ 962: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.573766 786749 task_exit.go:204] [ 962: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.573804 786749 task_exit.go:204] [ 962: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.575486 786749 task_exit.go:204] [ 962: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.575535 786749 task_exit.go:204] [ 962: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.575564 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.575673 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.575750 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.575807 786749 task_exit.go:204] [ 962: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.576469 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.578188 786749 syscalls.go:262] [ 967: 967] Allocating stack with size of 8388608 bytes D0713 00:07:59.578415 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.583802 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.583917 786749 usertrap_amd64.go:106] [ 967: 967] Map a usertrap vma at 65000 D0713 00:07:59.588718 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 1 D0713 00:07:59.588808 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:59.589365 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.589422 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 2 D0713 00:07:59.589441 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:59.590365 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.590410 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 3 D0713 00:07:59.590426 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:59.597193 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.597236 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 4 D0713 00:07:59.597253 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:59.598393 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.598422 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 5 D0713 00:07:59.598437 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:59.598505 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.598519 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 6 D0713 00:07:59.598526 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:59.598750 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.598775 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 7 D0713 00:07:59.598785 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:59.599068 786749 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.599139 786749 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc0004a8300 8 D0713 00:07:59.599173 786749 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:59.599355 786749 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.599382 786749 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc0004a8300 9 D0713 00:07:59.599394 786749 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:59.599449 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.599467 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 10 D0713 00:07:59.599476 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:59.607187 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.607284 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 11 D0713 00:07:59.607307 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:59.609877 786749 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.609900 786749 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc0004a8300 12 D0713 00:07:59.609917 786749 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:59.609984 786749 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.610016 786749 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc0004a8300 13 D0713 00:07:59.610029 786749 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:59.610068 786749 task_signals.go:470] [ 967: 967] Notified of signal 23 D0713 00:07:59.610138 786749 task_signals.go:220] [ 967: 967] Signal 23: delivering to handler D0713 00:07:59.617928 786749 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.617959 786749 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc0004a8300 14 D0713 00:07:59.617971 786749 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:59.618022 786749 task_exit.go:204] [ 967: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.618054 786749 task_exit.go:204] [ 967: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.618079 786749 task_signals.go:204] [ 967: 968] Signal 967, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.618095 786749 task_exit.go:204] [ 967: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.618103 786749 task_exit.go:204] [ 967: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.618109 786749 task_exit.go:204] [ 967: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.618124 786749 task_signals.go:204] [ 967: 969] Signal 967, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.618160 786749 task_signals.go:204] [ 967: 971] Signal 967, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.618177 786749 task_exit.go:204] [ 967: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.618185 786749 task_exit.go:204] [ 967: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.618190 786749 task_exit.go:204] [ 967: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.618162 786749 task_signals.go:204] [ 967: 970] Signal 967, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.618202 786749 task_exit.go:204] [ 967: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.618208 786749 task_exit.go:204] [ 967: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.618213 786749 task_exit.go:204] [ 967: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.618223 786749 task_exit.go:204] [ 967: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.619588 786749 task_exit.go:204] [ 967: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.619615 786749 task_exit.go:204] [ 967: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.619628 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.619697 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.619723 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.619855 786749 task_exit.go:204] [ 967: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.620358 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.621747 786749 syscalls.go:262] [ 972: 972] Allocating stack with size of 8388608 bytes D0713 00:07:59.621866 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.623971 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.624003 786749 usertrap_amd64.go:106] [ 972: 972] Map a usertrap vma at 67000 D0713 00:07:59.624083 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 1 D0713 00:07:59.624100 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.624347 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.624363 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 2 D0713 00:07:59.624369 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.624815 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.624836 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 3 D0713 00:07:59.624845 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.629985 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.630012 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 4 D0713 00:07:59.630023 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.631180 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.631211 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 5 D0713 00:07:59.631226 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.631605 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.631625 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 6 D0713 00:07:59.631636 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.631973 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.632005 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 7 D0713 00:07:59.632014 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.632162 786749 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.632182 786749 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc001c9b140 8 D0713 00:07:59.632190 786749 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.632288 786749 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.632313 786749 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc001c9b140 9 D0713 00:07:59.632324 786749 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.632375 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.632385 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 10 D0713 00:07:59.632394 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.639619 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.639644 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 11 D0713 00:07:59.639654 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.642846 786749 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.642876 786749 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc001c9b140 12 D0713 00:07:59.642888 786749 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.642973 786749 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.643000 786749 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc001c9b140 13 D0713 00:07:59.643011 786749 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.643084 786749 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 00:07:59.643154 786749 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler D0713 00:07:59.649182 786749 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.649263 786749 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc001c9b140 14 D0713 00:07:59.649307 786749 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.649329 786749 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.649392 786749 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.649390 786749 task_signals.go:204] [ 972: 976] Signal 972, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.649424 786749 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.649436 786749 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.649442 786749 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.649457 786749 task_signals.go:204] [ 972: 974] Signal 972, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.649477 786749 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.649485 786749 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.649491 786749 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.649504 786749 task_signals.go:204] [ 972: 975] Signal 972, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.649536 786749 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.649548 786749 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.649562 786749 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.649504 786749 task_signals.go:204] [ 972: 973] Signal 972, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.649574 786749 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.650643 786749 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.650672 786749 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.650684 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.653149 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.653185 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.653314 786749 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.653897 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.655236 786749 syscalls.go:262] [ 977: 977] Allocating stack with size of 8388608 bytes D0713 00:07:59.655347 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.656433 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.656482 786749 usertrap_amd64.go:106] [ 977: 977] Map a usertrap vma at 61000 D0713 00:07:59.656578 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 1 D0713 00:07:59.656612 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:59.657009 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.657034 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 2 D0713 00:07:59.657044 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:59.657798 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.657826 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 3 D0713 00:07:59.657836 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:59.678357 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.678391 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 4 D0713 00:07:59.678408 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:59.679497 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.679539 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 5 D0713 00:07:59.679553 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:59.679605 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.679623 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 6 D0713 00:07:59.679631 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:59.679875 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.679896 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 7 D0713 00:07:59.679905 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:59.680070 786749 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.680094 786749 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001b3eab0 8 D0713 00:07:59.680103 786749 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:59.680240 786749 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.680271 786749 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001b3eab0 9 D0713 00:07:59.680284 786749 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:59.680349 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.680357 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 10 D0713 00:07:59.680365 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:59.689096 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.689129 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 11 D0713 00:07:59.689141 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:59.691916 786749 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.691949 786749 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001b3eab0 12 D0713 00:07:59.691962 786749 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:59.692025 786749 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.692049 786749 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001b3eab0 13 D0713 00:07:59.692060 786749 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:59.692202 786749 task_signals.go:470] [ 977: 977] Notified of signal 23 D0713 00:07:59.692321 786749 task_signals.go:220] [ 977: 977] Signal 23: delivering to handler D0713 00:07:59.700866 786749 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.700913 786749 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001b3eab0 14 D0713 00:07:59.700931 786749 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:59.701074 786749 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.701105 786749 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.701141 786749 task_signals.go:204] [ 977: 979] Signal 977, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.701136 786749 task_signals.go:204] [ 977: 978] Signal 977, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.701187 786749 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.701209 786749 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.701216 786749 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.701151 786749 task_signals.go:204] [ 977: 981] Signal 977, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.701239 786749 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.701247 786749 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.701252 786749 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.701263 786749 task_signals.go:204] [ 977: 980] Signal 977, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.701275 786749 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.701282 786749 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.701287 786749 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.701296 786749 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.702928 786749 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.703117 786749 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.703201 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.703266 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.703281 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.703505 786749 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 00:07:59.703717 786749 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 00:07:59.704276 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.706089 786749 syscalls.go:262] [ 982: 982] Allocating stack with size of 8388608 bytes D0713 00:07:59.706223 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.707446 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.707479 786749 usertrap_amd64.go:106] [ 982: 982] Map a usertrap vma at 66000 D0713 00:07:59.707606 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 1 D0713 00:07:59.707635 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:59.708086 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.708110 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 2 D0713 00:07:59.708117 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:59.708850 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.708869 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 3 D0713 00:07:59.708881 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:59.716635 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.716676 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 4 D0713 00:07:59.716702 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:59.718036 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.718077 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 5 D0713 00:07:59.718092 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:59.718175 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.718187 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 6 D0713 00:07:59.718197 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:59.718446 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.718461 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 7 D0713 00:07:59.718471 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:59.718775 786749 usertrap_amd64.go:212] [ 982: 984] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.718789 786749 usertrap_amd64.go:122] [ 982: 984] Allocate a new trap: 0xc001a9a2a0 8 D0713 00:07:59.718800 786749 usertrap_amd64.go:225] [ 982: 984] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:59.718933 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.718957 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 9 D0713 00:07:59.718966 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:59.719214 786749 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.719296 786749 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001a9a2a0 10 D0713 00:07:59.719332 786749 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:59.727396 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.727434 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 11 D0713 00:07:59.727446 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:59.732145 786749 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.732177 786749 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001a9a2a0 12 D0713 00:07:59.732192 786749 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:59.732212 786749 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.732218 786749 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001a9a2a0 13 D0713 00:07:59.732237 786749 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:59.732372 786749 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 00:07:59.732457 786749 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler I0713 00:07:59.739198 786749 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 00:07:59.739318 786749 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.739339 786749 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001a9a2a0 14 D0713 00:07:59.739354 786749 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:59.739445 786749 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.739490 786749 task_signals.go:204] [ 982: 983] Signal 982, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.739529 786749 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.739515 786749 task_signals.go:204] [ 982: 984] Signal 982, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.739548 786749 task_signals.go:204] [ 982: 985] Signal 982, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.739560 786749 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.739634 786749 task_signals.go:204] [ 982: 986] Signal 982, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.739683 786749 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.739698 786749 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.739717 786749 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.739731 786749 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.739736 786749 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.739746 786749 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.739761 786749 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.739766 786749 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.739775 786749 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.741506 786749 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.741597 786749 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.741656 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.741797 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.741860 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.742070 786749 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.742687 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.744225 786749 syscalls.go:262] [ 987: 987] Allocating stack with size of 8388608 bytes D0713 00:07:59.744354 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.746003 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.746039 786749 usertrap_amd64.go:106] [ 987: 987] Map a usertrap vma at 6a000 D0713 00:07:59.746134 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 1 D0713 00:07:59.746175 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:59.746804 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.746830 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 2 D0713 00:07:59.746846 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:59.747375 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.747401 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 3 D0713 00:07:59.747412 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:59.749355 786749 sampler.go:191] Time: Adjusting syscall overhead down to 451 D0713 00:07:59.756879 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.756918 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 4 D0713 00:07:59.756933 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:59.758234 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.758255 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 5 D0713 00:07:59.758267 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:59.758308 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.758316 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 6 D0713 00:07:59.758325 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:59.758768 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.758782 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 7 D0713 00:07:59.758788 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:59.758954 786749 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.758982 786749 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001c9b4d0 8 D0713 00:07:59.758996 786749 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:59.759223 786749 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.759246 786749 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001c9b4d0 9 D0713 00:07:59.759255 786749 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:59.759390 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.759421 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 10 D0713 00:07:59.759431 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:59.768535 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.768586 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 11 D0713 00:07:59.768605 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:59.773227 786749 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.773286 786749 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001c9b4d0 12 D0713 00:07:59.773305 786749 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:59.773376 786749 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.773399 786749 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001c9b4d0 13 D0713 00:07:59.773416 786749 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:59.773467 786749 task_signals.go:470] [ 987: 987] Notified of signal 23 D0713 00:07:59.773550 786749 task_signals.go:220] [ 987: 987] Signal 23: delivering to handler I0713 00:07:59.783107 786749 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 00:07:59.783208 786749 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.783221 786749 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001c9b4d0 14 D0713 00:07:59.783233 786749 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:59.783323 786749 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.783361 786749 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.783387 786749 task_signals.go:204] [ 987: 989] Signal 987, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.783438 786749 task_signals.go:204] [ 987: 988] Signal 987, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.783421 786749 task_signals.go:204] [ 987: 991] Signal 987, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.783444 786749 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.783486 786749 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.783494 786749 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.783403 786749 task_signals.go:204] [ 987: 990] Signal 987, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.783518 786749 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.783527 786749 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.783533 786749 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.783546 786749 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.783563 786749 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.783569 786749 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.783583 786749 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.785149 786749 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.785185 786749 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.785208 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.785285 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.785310 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.785463 786749 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.785993 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.787602 786749 syscalls.go:262] [ 992: 992] Allocating stack with size of 8388608 bytes D0713 00:07:59.787722 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.789211 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.789252 786749 usertrap_amd64.go:106] [ 992: 992] Map a usertrap vma at 66000 D0713 00:07:59.789372 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 1 D0713 00:07:59.789444 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:59.789824 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.789882 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 2 D0713 00:07:59.789900 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:59.790602 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.790627 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 3 D0713 00:07:59.790640 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:59.797566 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.797597 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 4 D0713 00:07:59.797611 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:59.798761 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.798791 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 5 D0713 00:07:59.798803 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:59.798859 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.798867 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 6 D0713 00:07:59.798875 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:59.799111 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.799139 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 7 D0713 00:07:59.799148 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:59.799294 786749 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.799316 786749 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001a9aa80 8 D0713 00:07:59.799328 786749 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:59.799537 786749 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.799566 786749 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001a9aa80 9 D0713 00:07:59.799580 786749 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:59.799745 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.799760 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 10 D0713 00:07:59.799770 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:59.799794 786749 usertrap_amd64.go:212] [ 992: 995] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.799805 786749 usertrap_amd64.go:122] [ 992: 995] Allocate a new trap: 0xc001a9aa80 11 D0713 00:07:59.799816 786749 usertrap_amd64.go:225] [ 992: 995] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:59.807236 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.807267 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 12 D0713 00:07:59.807278 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:59.813267 786749 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.813341 786749 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001a9aa80 13 D0713 00:07:59.813361 786749 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:59.813563 786749 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.813587 786749 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001a9aa80 14 D0713 00:07:59.813601 786749 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:59.813654 786749 task_signals.go:470] [ 992: 992] Notified of signal 23 D0713 00:07:59.813716 786749 task_signals.go:220] [ 992: 992] Signal 23: delivering to handler D0713 00:07:59.822922 786749 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.822974 786749 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001a9aa80 15 D0713 00:07:59.823004 786749 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:07:59.823149 786749 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.823201 786749 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.823235 786749 task_signals.go:204] [ 992: 993] Signal 992, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.823262 786749 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.823268 786749 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.823272 786749 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.823286 786749 task_signals.go:204] [ 992: 996] Signal 992, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.823252 786749 task_signals.go:204] [ 992: 995] Signal 992, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.823299 786749 task_signals.go:204] [ 992: 994] Signal 992, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.823295 786749 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.823373 786749 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.823401 786749 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.823423 786749 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.823437 786749 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.823441 786749 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.823453 786749 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.825195 786749 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.825232 786749 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.825250 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.825372 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.825412 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.829119 786749 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.829782 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.831213 786749 syscalls.go:262] [ 997: 997] Allocating stack with size of 8388608 bytes D0713 00:07:59.831309 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.833283 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.833324 786749 usertrap_amd64.go:106] [ 997: 997] Map a usertrap vma at 60000 D0713 00:07:59.833403 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 1 D0713 00:07:59.833439 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.833817 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.833840 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 2 D0713 00:07:59.833852 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.835070 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.835098 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 3 D0713 00:07:59.835137 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.844106 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.844172 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 4 D0713 00:07:59.844194 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.845897 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.845934 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 5 D0713 00:07:59.845949 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.846003 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.846009 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 6 D0713 00:07:59.846018 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.846371 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.846397 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 7 D0713 00:07:59.846407 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.846718 786749 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.846939 786749 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001a9b140 8 D0713 00:07:59.847029 786749 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.847380 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.847412 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 9 D0713 00:07:59.847427 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.847617 786749 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.847648 786749 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001a9b140 10 D0713 00:07:59.847670 786749 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.857943 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.857977 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 11 D0713 00:07:59.857995 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.858916 786749 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.858959 786749 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001a9b140 12 D0713 00:07:59.858976 786749 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.859048 786749 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.859065 786749 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001a9b140 13 D0713 00:07:59.859082 786749 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.859175 786749 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 00:07:59.859295 786749 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler D0713 00:07:59.869894 786749 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 00:07:59.871897 786749 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler D0713 00:07:59.872746 786749 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.872817 786749 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001a9b140 14 D0713 00:07:59.872837 786749 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.873028 786749 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.873095 786749 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.873099 786749 task_signals.go:204] [ 997: 1000] Signal 997, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.873125 786749 task_signals.go:204] [ 997: 1001] Signal 997, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.873118 786749 task_signals.go:204] [ 997: 999] Signal 997, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.873134 786749 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.873173 786749 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.873209 786749 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.873234 786749 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.873267 786749 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.873285 786749 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.873326 786749 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.873337 786749 task_signals.go:204] [ 997: 998] Signal 997, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.873363 786749 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.873378 786749 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.873399 786749 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.875059 786749 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.875147 786749 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.875232 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.875302 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.875329 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.875441 786749 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.876359 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.878067 786749 syscalls.go:262] [ 1002: 1002] Allocating stack with size of 8388608 bytes D0713 00:07:59.878228 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.879274 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.879318 786749 usertrap_amd64.go:106] [ 1002: 1002] Map a usertrap vma at 60000 D0713 00:07:59.879415 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 1 D0713 00:07:59.879458 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.879784 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.879875 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 2 D0713 00:07:59.879905 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.881066 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.881127 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 3 D0713 00:07:59.881148 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.892201 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.892241 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 4 D0713 00:07:59.892258 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.893787 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.893822 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 5 D0713 00:07:59.893837 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.893903 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.893919 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 6 D0713 00:07:59.893928 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.894335 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.894368 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 7 D0713 00:07:59.894380 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.894636 786749 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.894692 786749 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c9b980 8 D0713 00:07:59.894717 786749 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.895053 786749 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.895141 786749 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c9b980 9 D0713 00:07:59.895178 786749 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.895218 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.895226 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 10 D0713 00:07:59.895234 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.904625 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.904663 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 11 D0713 00:07:59.904680 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.905583 786749 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.905649 786749 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c9b980 12 D0713 00:07:59.905670 786749 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.906045 786749 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.906114 786749 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c9b980 13 D0713 00:07:59.906138 786749 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.906268 786749 task_signals.go:470] [ 1002: 1002] Notified of signal 23 D0713 00:07:59.906595 786749 task_signals.go:220] [ 1002: 1002] Signal 23: delivering to handler D0713 00:07:59.918328 786749 task_signals.go:470] [ 1002: 1002] Notified of signal 23 D0713 00:07:59.919149 786749 task_signals.go:220] [ 1002: 1002] Signal 23: delivering to handler D0713 00:07:59.919953 786749 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.919991 786749 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c9b980 14 D0713 00:07:59.920010 786749 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.920089 786749 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.920120 786749 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.920152 786749 task_signals.go:204] [ 1002: 1005] Signal 1002, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.920142 786749 task_signals.go:204] [ 1002: 1004] Signal 1002, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.920169 786749 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.920178 786749 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.920187 786749 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.920177 786749 task_signals.go:204] [ 1002: 1006] Signal 1002, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.920219 786749 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.920267 786749 task_signals.go:204] [ 1002: 1003] Signal 1002, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.920291 786749 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.920325 786749 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.920332 786749 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.920359 786749 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.920424 786749 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.920451 786749 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.922246 786749 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.922486 786749 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.922538 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.922605 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.922652 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.922815 786749 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.923693 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.925511 786749 syscalls.go:262] [ 1007: 1007] Allocating stack with size of 8388608 bytes D0713 00:07:59.925644 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.928466 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.928513 786749 usertrap_amd64.go:106] [ 1007: 1007] Map a usertrap vma at 63000 D0713 00:07:59.928659 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 1 D0713 00:07:59.928704 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:59.929161 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.929188 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 2 D0713 00:07:59.929201 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:59.929892 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.929926 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 3 D0713 00:07:59.929938 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:59.937677 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.937697 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 4 D0713 00:07:59.937709 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:59.938875 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.938907 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 5 D0713 00:07:59.938921 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:59.938979 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.938991 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 6 D0713 00:07:59.938998 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:59.939379 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.939405 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 7 D0713 00:07:59.939417 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:59.939646 786749 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.939673 786749 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc0009890b0 8 D0713 00:07:59.939685 786749 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.939856 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.939945 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 9 D0713 00:07:59.939970 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.940013 786749 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.940039 786749 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc0009890b0 10 D0713 00:07:59.940049 786749 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.940788 786749 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.940820 786749 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc0009890b0 11 D0713 00:07:59.940835 786749 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.940896 786749 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.940929 786749 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc0009890b0 12 D0713 00:07:59.940955 786749 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.941083 786749 task_signals.go:470] [ 1007: 1007] Notified of signal 23 D0713 00:07:59.941151 786749 task_signals.go:220] [ 1007: 1007] Signal 23: delivering to handler D0713 00:07:59.949834 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.949852 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 13 D0713 00:07:59.949861 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.952547 786749 task_signals.go:470] [ 1007: 1007] Notified of signal 23 D0713 00:07:59.952628 786749 task_signals.go:220] [ 1007: 1007] Signal 23: delivering to handler D0713 00:07:59.961662 786749 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.961696 786749 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc0009890b0 14 D0713 00:07:59.961708 786749 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.961783 786749 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.961812 786749 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.961841 786749 task_signals.go:204] [ 1007: 1012] Signal 1007, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.961855 786749 task_exit.go:204] [ 1007: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.961863 786749 task_exit.go:204] [ 1007: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.961878 786749 task_exit.go:204] [ 1007: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.961834 786749 task_signals.go:204] [ 1007: 1009] Signal 1007, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.961851 786749 task_signals.go:204] [ 1007: 1011] Signal 1007, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.961897 786749 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.961903 786749 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.961904 786749 task_signals.go:204] [ 1007: 1010] Signal 1007, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.961908 786749 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.961953 786749 task_signals.go:204] [ 1007: 1008] Signal 1007, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.961980 786749 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.962001 786749 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.962031 786749 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.962054 786749 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.962082 786749 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.962143 786749 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.962150 786749 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.963745 786749 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.963767 786749 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.963784 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.963863 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.963877 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.964080 786749 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.964707 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.966470 786749 syscalls.go:262] [ 1013: 1013] Allocating stack with size of 8388608 bytes D0713 00:07:59.966680 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.968078 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.968117 786749 usertrap_amd64.go:106] [ 1013: 1013] Map a usertrap vma at 65000 D0713 00:07:59.968252 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 1 D0713 00:07:59.968289 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:59.968807 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.968857 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 2 D0713 00:07:59.968878 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:59.969626 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.969656 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 3 D0713 00:07:59.969671 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:59.976835 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.976873 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 4 D0713 00:07:59.976895 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:59.978489 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.978540 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 5 D0713 00:07:59.978558 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:59.978624 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.978647 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 6 D0713 00:07:59.978655 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:59.978993 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.979011 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 7 D0713 00:07:59.979018 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:59.979194 786749 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.979230 786749 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc0004a8ab0 8 D0713 00:07:59.979244 786749 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:59.979595 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.979624 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 9 D0713 00:07:59.979640 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:59.979685 786749 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.979712 786749 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc0004a8ab0 10 D0713 00:07:59.979725 786749 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:59.980238 786749 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.980263 786749 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc0004a8ab0 11 D0713 00:07:59.980274 786749 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:59.980397 786749 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.980421 786749 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc0004a8ab0 12 D0713 00:07:59.980429 786749 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:59.980591 786749 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0713 00:07:59.980750 786749 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0713 00:07:59.988921 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.988997 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 13 D0713 00:07:59.989011 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:59.991150 786749 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0713 00:07:59.991754 786749 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0713 00:07:59.991936 786749 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0713 00:07:59.991998 786749 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0713 00:08:00.000432 786749 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.000476 786749 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc0004a8ab0 14 D0713 00:08:00.000490 786749 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.000533 786749 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.000555 786749 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.000588 786749 task_signals.go:204] [ 1013: 1014] Signal 1013, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.000614 786749 task_signals.go:204] [ 1013: 1016] Signal 1013, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.000623 786749 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.000653 786749 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.000670 786749 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.000591 786749 task_signals.go:204] [ 1013: 1015] Signal 1013, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.000694 786749 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.000729 786749 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.000744 786749 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.000757 786749 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.002256 786749 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.002282 786749 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.002304 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.002335 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.002357 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.002753 786749 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.003374 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.005026 786749 syscalls.go:262] [ 1017: 1017] Allocating stack with size of 8388608 bytes D0713 00:08:00.005344 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.006446 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.006480 786749 usertrap_amd64.go:106] [ 1017: 1017] Map a usertrap vma at 69000 D0713 00:08:00.006564 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 1 D0713 00:08:00.006590 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:00.007070 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.007093 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 2 D0713 00:08:00.007107 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:00.008018 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.008065 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 3 D0713 00:08:00.008085 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:00.015709 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.015746 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 4 D0713 00:08:00.015759 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:00.017054 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.017086 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 5 D0713 00:08:00.017098 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:00.017165 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.017184 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 6 D0713 00:08:00.017193 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:00.017849 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.017928 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 7 D0713 00:08:00.017951 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:00.018207 786749 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.018284 786749 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc001c9bf20 8 D0713 00:08:00.018339 786749 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:00.018531 786749 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.018568 786749 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc001c9bf20 9 D0713 00:08:00.018582 786749 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:00.018629 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.018654 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 10 D0713 00:08:00.018663 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:00.028622 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.028667 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 11 D0713 00:08:00.028684 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:00.028834 786749 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.028910 786749 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc001c9bf20 12 D0713 00:08:00.028933 786749 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:00.029082 786749 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.029114 786749 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc001c9bf20 13 D0713 00:08:00.029128 786749 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:00.029151 786749 task_signals.go:470] [ 1017: 1017] Notified of signal 23 D0713 00:08:00.029186 786749 task_signals.go:220] [ 1017: 1017] Signal 23: delivering to handler D0713 00:08:00.040435 786749 task_signals.go:470] [ 1017: 1017] Notified of signal 23 D0713 00:08:00.040538 786749 task_signals.go:220] [ 1017: 1017] Signal 23: delivering to handler D0713 00:08:00.040786 786749 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.040809 786749 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc001c9bf20 14 D0713 00:08:00.040824 786749 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:00.040886 786749 task_exit.go:204] [ 1017: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.040928 786749 task_signals.go:204] [ 1017: 1019] Signal 1017, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.040925 786749 task_exit.go:204] [ 1017: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.040992 786749 task_exit.go:204] [ 1017: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.041014 786749 task_signals.go:204] [ 1017: 1018] Signal 1017, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.041015 786749 task_signals.go:204] [ 1017: 1020] Signal 1017, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.041038 786749 task_exit.go:204] [ 1017: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.041049 786749 task_exit.go:204] [ 1017: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.041069 786749 task_signals.go:204] [ 1017: 1021] Signal 1017, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.041091 786749 task_exit.go:204] [ 1017: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.041115 786749 task_exit.go:204] [ 1017: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.041122 786749 task_exit.go:204] [ 1017: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.041134 786749 task_exit.go:204] [ 1017: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.041143 786749 task_exit.go:204] [ 1017: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.041149 786749 task_exit.go:204] [ 1017: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.041171 786749 task_exit.go:204] [ 1017: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.043138 786749 task_exit.go:204] [ 1017: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.043201 786749 task_exit.go:204] [ 1017: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.043226 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.043298 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.043325 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.043648 786749 task_exit.go:204] [ 1017: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.044464 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.046216 786749 syscalls.go:262] [ 1022: 1022] Allocating stack with size of 8388608 bytes D0713 00:08:00.046451 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.048105 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.048145 786749 usertrap_amd64.go:106] [ 1022: 1022] Map a usertrap vma at 67000 D0713 00:08:00.048270 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 1 D0713 00:08:00.048304 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:00.048807 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.048832 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 2 D0713 00:08:00.048849 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:00.049481 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.049584 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 3 D0713 00:08:00.049616 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:00.057205 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.057251 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 4 D0713 00:08:00.057285 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:00.058765 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.058864 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 5 D0713 00:08:00.058897 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:00.059031 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.059055 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 6 D0713 00:08:00.059064 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:00.059411 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.059431 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 7 D0713 00:08:00.059439 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:00.060291 786749 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.060315 786749 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc0004a8d50 8 D0713 00:08:00.060327 786749 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:00.060445 786749 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.060464 786749 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc0004a8d50 9 D0713 00:08:00.060474 786749 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:00.060604 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.060622 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 10 D0713 00:08:00.060631 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:00.069297 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.069347 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 11 D0713 00:08:00.069362 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:00.072050 786749 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.072090 786749 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc0004a8d50 12 D0713 00:08:00.072108 786749 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:00.072134 786749 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.072144 786749 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc0004a8d50 13 D0713 00:08:00.072154 786749 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:00.072216 786749 task_signals.go:470] [ 1022: 1022] Notified of signal 23 D0713 00:08:00.072330 786749 task_signals.go:220] [ 1022: 1022] Signal 23: delivering to handler D0713 00:08:00.080929 786749 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.081046 786749 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc0004a8d50 14 D0713 00:08:00.081071 786749 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:00.081170 786749 task_exit.go:204] [ 1022: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.081229 786749 task_signals.go:204] [ 1022: 1025] Signal 1022, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.081242 786749 task_signals.go:204] [ 1022: 1024] Signal 1022, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.081280 786749 task_signals.go:204] [ 1022: 1027] Signal 1022, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.081292 786749 task_signals.go:204] [ 1022: 1023] Signal 1022, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.081331 786749 task_signals.go:204] [ 1022: 1026] Signal 1022, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.081357 786749 task_exit.go:204] [ 1022: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.081395 786749 task_exit.go:204] [ 1022: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.081413 786749 task_exit.go:204] [ 1022: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.081420 786749 task_exit.go:204] [ 1022: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.081434 786749 task_exit.go:204] [ 1022: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.081486 786749 task_exit.go:204] [ 1022: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.081495 786749 task_exit.go:204] [ 1022: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.081510 786749 task_exit.go:204] [ 1022: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.081520 786749 task_exit.go:204] [ 1022: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.081534 786749 task_exit.go:204] [ 1022: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.081541 786749 task_exit.go:204] [ 1022: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.081549 786749 task_exit.go:204] [ 1022: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.081553 786749 task_exit.go:204] [ 1022: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.081559 786749 task_exit.go:204] [ 1022: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.083167 786749 task_exit.go:204] [ 1022: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.083210 786749 task_exit.go:204] [ 1022: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.083223 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.083260 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.083271 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.083435 786749 task_exit.go:204] [ 1022: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.084036 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.085454 786749 syscalls.go:262] [ 1028: 1028] Allocating stack with size of 8388608 bytes D0713 00:08:00.085614 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.086919 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.086947 786749 usertrap_amd64.go:106] [ 1028: 1028] Map a usertrap vma at 63000 D0713 00:08:00.087026 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 1 D0713 00:08:00.087051 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:00.087432 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.087463 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 2 D0713 00:08:00.087476 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:00.088211 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.088240 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 3 D0713 00:08:00.088256 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:00.095221 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.095253 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 4 D0713 00:08:00.095269 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:00.096666 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.096744 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 5 D0713 00:08:00.096766 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:00.097065 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.097087 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 6 D0713 00:08:00.097095 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:00.097538 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.097559 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 7 D0713 00:08:00.097567 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:00.097861 786749 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.097914 786749 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc0004a8de0 8 D0713 00:08:00.097931 786749 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:00.098397 786749 usertrap_amd64.go:212] [ 1028: 1030] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.098432 786749 usertrap_amd64.go:122] [ 1028: 1030] Allocate a new trap: 0xc0004a8de0 9 D0713 00:08:00.098450 786749 usertrap_amd64.go:225] [ 1028: 1030] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:00.098690 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.098736 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 10 D0713 00:08:00.098758 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:00.107542 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.107570 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 11 D0713 00:08:00.107579 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:00.110305 786749 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.110359 786749 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc0004a8de0 12 D0713 00:08:00.110382 786749 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:00.110425 786749 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.110451 786749 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc0004a8de0 13 D0713 00:08:00.110461 786749 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:00.110529 786749 task_signals.go:470] [ 1028: 1028] Notified of signal 23 D0713 00:08:00.110593 786749 task_signals.go:220] [ 1028: 1028] Signal 23: delivering to handler I0713 00:08:00.118662 786749 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 00:08:00.118795 786749 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.118806 786749 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc0004a8de0 14 D0713 00:08:00.118814 786749 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:00.118859 786749 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.118892 786749 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.118910 786749 task_signals.go:204] [ 1028: 1030] Signal 1028, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.118944 786749 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.118956 786749 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.118930 786749 task_signals.go:204] [ 1028: 1032] Signal 1028, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.118963 786749 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.118917 786749 task_signals.go:204] [ 1028: 1031] Signal 1028, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.118981 786749 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.118995 786749 task_signals.go:204] [ 1028: 1029] Signal 1028, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.119009 786749 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.119016 786749 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.119023 786749 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.119051 786749 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.119063 786749 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.119074 786749 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.120834 786749 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.120858 786749 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.120879 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.120912 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.120924 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.121082 786749 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.122260 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.123797 786749 syscalls.go:262] [ 1033: 1033] Allocating stack with size of 8388608 bytes D0713 00:08:00.124099 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.125491 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.125536 786749 usertrap_amd64.go:106] [ 1033: 1033] Map a usertrap vma at 65000 D0713 00:08:00.125662 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 1 D0713 00:08:00.125707 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:00.126194 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.126215 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 2 D0713 00:08:00.126223 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:00.126819 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.126846 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 3 D0713 00:08:00.126857 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:00.133344 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.133388 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 4 D0713 00:08:00.133398 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:00.134589 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.134619 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 5 D0713 00:08:00.134630 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:00.134716 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.134731 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 6 D0713 00:08:00.134745 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:00.135063 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.135087 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 7 D0713 00:08:00.135096 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:00.135225 786749 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.135241 786749 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc00170e4b0 8 D0713 00:08:00.135247 786749 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:00.135395 786749 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.135420 786749 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc00170e4b0 9 D0713 00:08:00.135429 786749 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:00.135516 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.135545 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 10 D0713 00:08:00.135557 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:00.136138 786749 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.136169 786749 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc00170e4b0 11 D0713 00:08:00.136181 786749 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:00.136347 786749 usertrap_amd64.go:212] [ 1033: 1034] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.136389 786749 usertrap_amd64.go:122] [ 1033: 1034] Allocate a new trap: 0xc00170e4b0 12 D0713 00:08:00.136407 786749 usertrap_amd64.go:225] [ 1033: 1034] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:00.136429 786749 task_signals.go:470] [ 1033: 1033] Notified of signal 23 D0713 00:08:00.136463 786749 task_signals.go:220] [ 1033: 1033] Signal 23: delivering to handler D0713 00:08:00.143622 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.143682 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 13 D0713 00:08:00.143695 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:00.147263 786749 task_signals.go:470] [ 1033: 1033] Notified of signal 23 D0713 00:08:00.147622 786749 task_signals.go:220] [ 1033: 1033] Signal 23: delivering to handler D0713 00:08:00.147768 786749 task_signals.go:470] [ 1033: 1033] Notified of signal 23 D0713 00:08:00.147854 786749 task_signals.go:220] [ 1033: 1033] Signal 23: delivering to handler I0713 00:08:00.155314 786749 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 00:08:00.155409 786749 usertrap_amd64.go:212] [ 1033: 1033] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.155436 786749 usertrap_amd64.go:122] [ 1033: 1033] Allocate a new trap: 0xc00170e4b0 14 D0713 00:08:00.155460 786749 usertrap_amd64.go:225] [ 1033: 1033] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.155678 786749 task_exit.go:204] [ 1033: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.155701 786749 task_exit.go:204] [ 1033: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.155724 786749 task_signals.go:204] [ 1033: 1036] Signal 1033, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.155722 786749 task_signals.go:204] [ 1033: 1035] Signal 1033, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.155734 786749 task_exit.go:204] [ 1033: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.155752 786749 task_signals.go:204] [ 1033: 1034] Signal 1033, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.155777 786749 task_signals.go:204] [ 1033: 1037] Signal 1033, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.155790 786749 task_exit.go:204] [ 1033: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.155799 786749 task_exit.go:204] [ 1033: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.155826 786749 task_exit.go:204] [ 1033: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.155834 786749 task_exit.go:204] [ 1033: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.155839 786749 task_exit.go:204] [ 1033: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.155847 786749 task_exit.go:204] [ 1033: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.155870 786749 task_exit.go:204] [ 1033: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.155885 786749 task_exit.go:204] [ 1033: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.155894 786749 task_exit.go:204] [ 1033: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.157331 786749 task_exit.go:204] [ 1033: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.157362 786749 task_exit.go:204] [ 1033: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.157388 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.160356 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.160491 786749 task_exit.go:204] [ 1033: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.161318 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.162882 786749 syscalls.go:262] [ 1038: 1038] Allocating stack with size of 8388608 bytes D0713 00:08:00.163000 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.164200 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.164242 786749 usertrap_amd64.go:106] [ 1038: 1038] Map a usertrap vma at 68000 D0713 00:08:00.164309 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 1 D0713 00:08:00.164340 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:08:00.164602 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.164624 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 2 D0713 00:08:00.164630 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:08:00.165638 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.165717 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 3 D0713 00:08:00.165732 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:08:00.173236 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.173271 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 4 D0713 00:08:00.173283 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:08:00.174546 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.174578 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 5 D0713 00:08:00.174590 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:08:00.174680 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.174690 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 6 D0713 00:08:00.174700 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:08:00.175252 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.175317 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 7 D0713 00:08:00.175335 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:08:00.175600 786749 usertrap_amd64.go:212] [ 1038: 1039] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.175628 786749 usertrap_amd64.go:122] [ 1038: 1039] Allocate a new trap: 0xc000b1d530 8 D0713 00:08:00.175643 786749 usertrap_amd64.go:225] [ 1038: 1039] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:08:00.175812 786749 usertrap_amd64.go:212] [ 1038: 1039] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.175841 786749 usertrap_amd64.go:122] [ 1038: 1039] Allocate a new trap: 0xc000b1d530 9 D0713 00:08:00.175852 786749 usertrap_amd64.go:225] [ 1038: 1039] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:08:00.175965 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.175985 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 10 D0713 00:08:00.175999 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:08:00.185593 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.185624 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 11 D0713 00:08:00.185637 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:08:00.186478 786749 usertrap_amd64.go:212] [ 1038: 1039] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.186505 786749 usertrap_amd64.go:122] [ 1038: 1039] Allocate a new trap: 0xc000b1d530 12 D0713 00:08:00.186517 786749 usertrap_amd64.go:225] [ 1038: 1039] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:08:00.188245 786749 usertrap_amd64.go:212] [ 1038: 1039] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.188481 786749 usertrap_amd64.go:122] [ 1038: 1039] Allocate a new trap: 0xc000b1d530 13 D0713 00:08:00.188583 786749 usertrap_amd64.go:225] [ 1038: 1039] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:08:00.188742 786749 task_signals.go:470] [ 1038: 1038] Notified of signal 23 D0713 00:08:00.188839 786749 task_signals.go:220] [ 1038: 1038] Signal 23: delivering to handler I0713 00:08:00.197471 786749 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 00:08:00.197564 786749 usertrap_amd64.go:212] [ 1038: 1038] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.197577 786749 usertrap_amd64.go:122] [ 1038: 1038] Allocate a new trap: 0xc000b1d530 14 D0713 00:08:00.197589 786749 usertrap_amd64.go:225] [ 1038: 1038] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:08:00.197668 786749 task_exit.go:204] [ 1038: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.197706 786749 task_exit.go:204] [ 1038: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.197732 786749 task_signals.go:204] [ 1038: 1040] Signal 1038, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.197750 786749 task_exit.go:204] [ 1038: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.197743 786749 task_signals.go:204] [ 1038: 1041] Signal 1038, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.197760 786749 task_signals.go:204] [ 1038: 1039] Signal 1038, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.197740 786749 task_signals.go:204] [ 1038: 1042] Signal 1038, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.197773 786749 task_exit.go:204] [ 1038: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.197798 786749 task_exit.go:204] [ 1038: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.197839 786749 task_exit.go:204] [ 1038: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.197859 786749 task_exit.go:204] [ 1038: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.197865 786749 task_exit.go:204] [ 1038: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.197873 786749 task_exit.go:204] [ 1038: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.197880 786749 task_exit.go:204] [ 1038: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.197892 786749 task_exit.go:204] [ 1038: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.197902 786749 task_exit.go:204] [ 1038: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.199213 786749 task_exit.go:204] [ 1038: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.199256 786749 task_exit.go:204] [ 1038: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.199270 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.199309 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.199320 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.199486 786749 task_exit.go:204] [ 1038: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.200072 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.201737 786749 syscalls.go:262] [ 1043: 1043] Allocating stack with size of 8388608 bytes D0713 00:08:00.201853 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.203278 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.203420 786749 usertrap_amd64.go:106] [ 1043: 1043] Map a usertrap vma at 62000 D0713 00:08:00.203561 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 1 D0713 00:08:00.203597 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:08:00.204005 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.204033 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 2 D0713 00:08:00.204045 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:08:00.204715 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.204744 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 3 D0713 00:08:00.204754 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:08:00.211702 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.211737 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 4 D0713 00:08:00.211748 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:08:00.212868 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.212905 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 5 D0713 00:08:00.212913 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:08:00.213013 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.213041 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 6 D0713 00:08:00.213050 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:08:00.213517 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.213547 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 7 D0713 00:08:00.213556 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:08:00.213742 786749 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.213759 786749 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc001b3f860 8 D0713 00:08:00.213769 786749 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:08:00.214137 786749 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.214186 786749 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc001b3f860 9 D0713 00:08:00.214206 786749 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:08:00.214223 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.214238 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 10 D0713 00:08:00.214330 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:08:00.223213 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.223256 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 11 D0713 00:08:00.223272 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:08:00.226120 786749 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.226171 786749 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc001b3f860 12 D0713 00:08:00.226189 786749 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:08:00.226260 786749 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.226269 786749 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc001b3f860 13 D0713 00:08:00.226280 786749 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:08:00.226301 786749 task_signals.go:470] [ 1043: 1043] Notified of signal 23 D0713 00:08:00.226418 786749 task_signals.go:220] [ 1043: 1043] Signal 23: delivering to handler I0713 00:08:00.235440 786749 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 00:08:00.235557 786749 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.235578 786749 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc001b3f860 14 D0713 00:08:00.235596 786749 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:08:00.235675 786749 task_exit.go:204] [ 1043: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.235708 786749 task_exit.go:204] [ 1043: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.235749 786749 task_signals.go:204] [ 1043: 1046] Signal 1043, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.235784 786749 task_exit.go:204] [ 1043: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.235771 786749 task_signals.go:204] [ 1043: 1045] Signal 1043, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.235801 786749 task_exit.go:204] [ 1043: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.235831 786749 task_exit.go:204] [ 1043: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.235853 786749 task_signals.go:204] [ 1043: 1047] Signal 1043, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.235867 786749 task_exit.go:204] [ 1043: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.235876 786749 task_exit.go:204] [ 1043: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.235890 786749 task_exit.go:204] [ 1043: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.235870 786749 task_signals.go:204] [ 1043: 1044] Signal 1043, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.235903 786749 task_exit.go:204] [ 1043: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.235923 786749 task_exit.go:204] [ 1043: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.235937 786749 task_exit.go:204] [ 1043: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.235947 786749 task_exit.go:204] [ 1043: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.237727 786749 task_exit.go:204] [ 1043: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.237815 786749 task_exit.go:204] [ 1043: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.237838 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.241090 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.241143 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.242403 786749 task_exit.go:204] [ 1043: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.243100 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.244537 786749 syscalls.go:262] [ 1048: 1048] Allocating stack with size of 8388608 bytes D0713 00:08:00.244878 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.246123 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.246161 786749 usertrap_amd64.go:106] [ 1048: 1048] Map a usertrap vma at 67000 D0713 00:08:00.246293 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 1 D0713 00:08:00.246368 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:00.249351 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.249412 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 2 D0713 00:08:00.249429 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:00.250174 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.250210 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 3 D0713 00:08:00.250224 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:00.257709 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.257758 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 4 D0713 00:08:00.257774 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:00.258969 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.259022 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 5 D0713 00:08:00.259041 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:00.259104 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.259123 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 6 D0713 00:08:00.259130 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:00.259528 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.259552 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 7 D0713 00:08:00.259562 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:00.259756 786749 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.259773 786749 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004a8f90 8 D0713 00:08:00.259783 786749 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:00.259951 786749 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.259963 786749 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004a8f90 9 D0713 00:08:00.259973 786749 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:00.260091 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.260103 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 10 D0713 00:08:00.260112 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:00.268134 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.268184 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 11 D0713 00:08:00.268202 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:00.271049 786749 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.271099 786749 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004a8f90 12 D0713 00:08:00.271119 786749 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:00.271344 786749 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.271382 786749 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004a8f90 13 D0713 00:08:00.271397 786749 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:00.271456 786749 task_signals.go:470] [ 1048: 1048] Notified of signal 23 D0713 00:08:00.271542 786749 task_signals.go:220] [ 1048: 1048] Signal 23: delivering to handler D0713 00:08:00.280475 786749 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.280526 786749 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004a8f90 14 D0713 00:08:00.280543 786749 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:00.280620 786749 task_exit.go:204] [ 1048: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.280656 786749 task_exit.go:204] [ 1048: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.280660 786749 task_signals.go:204] [ 1048: 1049] Signal 1048, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.280701 786749 task_signals.go:204] [ 1048: 1052] Signal 1048, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.280702 786749 task_exit.go:204] [ 1048: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.280681 786749 task_signals.go:204] [ 1048: 1051] Signal 1048, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.280717 786749 task_exit.go:204] [ 1048: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.280722 786749 task_exit.go:204] [ 1048: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.280737 786749 task_exit.go:204] [ 1048: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.280774 786749 task_exit.go:204] [ 1048: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.280795 786749 task_exit.go:204] [ 1048: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.280738 786749 task_signals.go:204] [ 1048: 1050] Signal 1048, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.280812 786749 task_exit.go:204] [ 1048: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.280820 786749 task_exit.go:204] [ 1048: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.280931 786749 task_exit.go:204] [ 1048: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.281154 786749 task_exit.go:204] [ 1048: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.282826 786749 task_exit.go:204] [ 1048: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.282899 786749 task_exit.go:204] [ 1048: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.282942 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.283018 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.283140 786749 task_exit.go:204] [ 1048: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.283811 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.285392 786749 syscalls.go:262] [ 1053: 1053] Allocating stack with size of 8388608 bytes D0713 00:08:00.285522 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.287093 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.287137 786749 usertrap_amd64.go:106] [ 1053: 1053] Map a usertrap vma at 6a000 D0713 00:08:00.287209 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 1 D0713 00:08:00.287235 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.287594 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.287632 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 2 D0713 00:08:00.287650 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.288280 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.288313 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 3 D0713 00:08:00.288329 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.295355 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.295405 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 4 D0713 00:08:00.295429 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.297114 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.297137 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 5 D0713 00:08:00.297150 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.297203 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.297223 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 6 D0713 00:08:00.297229 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.297630 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.297658 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 7 D0713 00:08:00.297668 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.297876 786749 usertrap_amd64.go:212] [ 1053: 1054] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.297907 786749 usertrap_amd64.go:122] [ 1053: 1054] Allocate a new trap: 0xc000d4a150 8 D0713 00:08:00.297918 786749 usertrap_amd64.go:225] [ 1053: 1054] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.298078 786749 usertrap_amd64.go:212] [ 1053: 1054] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.298110 786749 usertrap_amd64.go:122] [ 1053: 1054] Allocate a new trap: 0xc000d4a150 9 D0713 00:08:00.298126 786749 usertrap_amd64.go:225] [ 1053: 1054] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.298138 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.298145 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 10 D0713 00:08:00.298153 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.308408 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.308469 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 11 D0713 00:08:00.308492 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.309097 786749 usertrap_amd64.go:212] [ 1053: 1054] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.309135 786749 usertrap_amd64.go:122] [ 1053: 1054] Allocate a new trap: 0xc000d4a150 12 D0713 00:08:00.309150 786749 usertrap_amd64.go:225] [ 1053: 1054] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.309639 786749 usertrap_amd64.go:212] [ 1053: 1054] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.309670 786749 usertrap_amd64.go:122] [ 1053: 1054] Allocate a new trap: 0xc000d4a150 13 D0713 00:08:00.309682 786749 usertrap_amd64.go:225] [ 1053: 1054] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.309720 786749 task_signals.go:470] [ 1053: 1053] Notified of signal 23 D0713 00:08:00.309766 786749 task_signals.go:220] [ 1053: 1053] Signal 23: delivering to handler D0713 00:08:00.320630 786749 task_signals.go:470] [ 1053: 1053] Notified of signal 23 D0713 00:08:00.320884 786749 task_signals.go:179] [ 1053: 1053] Restarting syscall 202: interrupted by signal 23 D0713 00:08:00.320925 786749 task_signals.go:220] [ 1053: 1053] Signal 23: delivering to handler D0713 00:08:00.321399 786749 usertrap_amd64.go:212] [ 1053: 1053] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.321434 786749 usertrap_amd64.go:122] [ 1053: 1053] Allocate a new trap: 0xc000d4a150 14 D0713 00:08:00.321450 786749 usertrap_amd64.go:225] [ 1053: 1053] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.321526 786749 task_exit.go:204] [ 1053: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.321568 786749 task_exit.go:204] [ 1053: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.321592 786749 task_signals.go:204] [ 1053: 1058] Signal 1053, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.321629 786749 task_signals.go:204] [ 1053: 1054] Signal 1053, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.321606 786749 task_signals.go:204] [ 1053: 1057] Signal 1053, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.321627 786749 task_signals.go:204] [ 1053: 1055] Signal 1053, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.321646 786749 task_exit.go:204] [ 1053: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.321669 786749 task_exit.go:204] [ 1053: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.321677 786749 task_exit.go:204] [ 1053: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.321599 786749 task_signals.go:204] [ 1053: 1056] Signal 1053, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.321706 786749 task_exit.go:204] [ 1053: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.321714 786749 task_exit.go:204] [ 1053: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.321720 786749 task_exit.go:204] [ 1053: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.321730 786749 task_exit.go:204] [ 1053: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.321737 786749 task_exit.go:204] [ 1053: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.321742 786749 task_exit.go:204] [ 1053: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.321752 786749 task_exit.go:204] [ 1053: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.321783 786749 task_exit.go:204] [ 1053: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.321803 786749 task_exit.go:204] [ 1053: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.321822 786749 task_exit.go:204] [ 1053: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.327128 786749 task_exit.go:204] [ 1053: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.327162 786749 task_exit.go:204] [ 1053: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.327178 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.327204 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.327216 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.327359 786749 task_exit.go:204] [ 1053: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.328101 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.329465 786749 syscalls.go:262] [ 1059: 1059] Allocating stack with size of 8388608 bytes D0713 00:08:00.329584 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.331804 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.331866 786749 usertrap_amd64.go:106] [ 1059: 1059] Map a usertrap vma at 64000 D0713 00:08:00.332239 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 1 D0713 00:08:00.332287 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:00.332886 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.332922 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 2 D0713 00:08:00.332936 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:00.333684 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.333716 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 3 D0713 00:08:00.333728 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:00.342243 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.342276 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 4 D0713 00:08:00.342290 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:00.344047 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.344074 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 5 D0713 00:08:00.344085 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:00.344150 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.344163 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 6 D0713 00:08:00.344168 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:00.344580 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.344607 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 7 D0713 00:08:00.344618 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:00.344872 786749 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.344935 786749 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0009895c0 8 D0713 00:08:00.345023 786749 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:00.345277 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.345304 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 9 D0713 00:08:00.345315 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:00.345330 786749 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.345337 786749 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0009895c0 10 D0713 00:08:00.345346 786749 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:00.346239 786749 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.346266 786749 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0009895c0 11 D0713 00:08:00.346278 786749 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:00.346341 786749 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.346347 786749 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0009895c0 12 D0713 00:08:00.346353 786749 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:00.346368 786749 task_signals.go:470] [ 1059: 1059] Notified of signal 23 D0713 00:08:00.346406 786749 task_signals.go:220] [ 1059: 1059] Signal 23: delivering to handler D0713 00:08:00.353541 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.353571 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 13 D0713 00:08:00.353586 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:00.357043 786749 task_signals.go:470] [ 1059: 1059] Notified of signal 23 D0713 00:08:00.357113 786749 task_signals.go:220] [ 1059: 1059] Signal 23: delivering to handler D0713 00:08:00.365783 786749 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.365825 786749 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0009895c0 14 D0713 00:08:00.365839 786749 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:00.365980 786749 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366021 786749 task_signals.go:204] [ 1059: 1063] Signal 1059, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366020 786749 task_signals.go:204] [ 1059: 1060] Signal 1059, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366057 786749 task_signals.go:204] [ 1059: 1061] Signal 1059, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366071 786749 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366091 786749 task_signals.go:204] [ 1059: 1062] Signal 1059, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366104 786749 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366165 786749 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366187 786749 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.366228 786749 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366257 786749 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366264 786749 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.366276 786749 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366285 786749 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366291 786749 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.366301 786749 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.367756 786749 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.367856 786749 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.367895 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.367925 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.367946 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.368085 786749 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.368434 786749 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:08:00.368477 786749 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:08:00.369008 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.370657 786749 syscalls.go:262] [ 1064: 1064] Allocating stack with size of 8388608 bytes D0713 00:08:00.370845 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.371849 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.371893 786749 usertrap_amd64.go:106] [ 1064: 1064] Map a usertrap vma at 61000 D0713 00:08:00.372039 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 1 D0713 00:08:00.372073 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:00.372382 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.372404 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 2 D0713 00:08:00.372415 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:00.372916 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.372983 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 3 D0713 00:08:00.373001 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:00.380034 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.380108 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 4 D0713 00:08:00.380133 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:00.381357 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.381384 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 5 D0713 00:08:00.381397 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:00.381432 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.381439 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 6 D0713 00:08:00.381445 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:00.381623 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.381641 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 7 D0713 00:08:00.381652 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:00.381846 786749 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.381882 786749 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc0009896e0 8 D0713 00:08:00.381897 786749 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:00.382216 786749 usertrap_amd64.go:212] [ 1064: 1066] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.382246 786749 usertrap_amd64.go:122] [ 1064: 1066] Allocate a new trap: 0xc0009896e0 9 D0713 00:08:00.382265 786749 usertrap_amd64.go:225] [ 1064: 1066] Apply the binary patch addr 46b6e0 trap addr 612d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:00.382283 786749 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.382290 786749 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc0009896e0 10 D0713 00:08:00.382298 786749 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:00.382322 786749 usertrap_amd64.go:212] [ 1064: 1066] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.382333 786749 usertrap_amd64.go:122] [ 1064: 1066] Allocate a new trap: 0xc0009896e0 11 D0713 00:08:00.382340 786749 usertrap_amd64.go:225] [ 1064: 1066] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:00.382557 786749 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.382587 786749 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc0009896e0 12 D0713 00:08:00.382602 786749 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:00.382657 786749 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.382684 786749 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc0009896e0 13 D0713 00:08:00.382695 786749 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:00.382715 786749 task_signals.go:470] [ 1064: 1067] Notified of signal 23 D0713 00:08:00.382751 786749 task_signals.go:179] [ 1064: 1067] Restarting syscall 202: interrupted by signal 23 D0713 00:08:00.382771 786749 task_signals.go:220] [ 1064: 1067] Signal 23: delivering to handler D0713 00:08:00.391102 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.391136 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 14 D0713 00:08:00.391148 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46af29 trap addr 61460 ([184 37 1 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:00.393826 786749 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 00:08:00.393980 786749 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 00:08:00.402194 786749 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.402228 786749 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc0009896e0 15 D0713 00:08:00.402240 786749 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:08:00.402290 786749 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.402329 786749 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.402366 786749 task_signals.go:204] [ 1064: 1065] Signal 1064, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.402381 786749 task_signals.go:204] [ 1064: 1068] Signal 1064, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.402368 786749 task_signals.go:204] [ 1064: 1067] Signal 1064, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.402387 786749 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.402408 786749 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.402361 786749 task_signals.go:204] [ 1064: 1066] Signal 1064, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.402420 786749 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.402459 786749 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.402472 786749 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.402486 786749 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.402498 786749 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.402503 786749 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.402506 786749 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.402512 786749 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.403905 786749 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.403921 786749 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.403933 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.403980 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.404005 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.404153 786749 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.404814 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.406475 786749 syscalls.go:262] [ 1069: 1069] Allocating stack with size of 8388608 bytes D0713 00:08:00.406620 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.407829 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.407870 786749 usertrap_amd64.go:106] [ 1069: 1069] Map a usertrap vma at 68000 D0713 00:08:00.407938 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 1 D0713 00:08:00.407973 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:08:00.408233 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.408253 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 2 D0713 00:08:00.408264 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:08:00.408839 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.408864 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 3 D0713 00:08:00.408876 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:08:00.415882 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.415919 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 4 D0713 00:08:00.415934 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:08:00.417098 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.417156 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 5 D0713 00:08:00.417170 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:08:00.417231 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.417252 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 6 D0713 00:08:00.417258 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:08:00.417493 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.417509 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 7 D0713 00:08:00.417518 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:08:00.417779 786749 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.417805 786749 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001b3ff80 8 D0713 00:08:00.417815 786749 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:08:00.417935 786749 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.417967 786749 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001b3ff80 9 D0713 00:08:00.417981 786749 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:08:00.418044 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.418117 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 10 D0713 00:08:00.418128 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:08:00.426004 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.426032 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 11 D0713 00:08:00.426052 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:08:00.430567 786749 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.430605 786749 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001b3ff80 12 D0713 00:08:00.430619 786749 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:08:00.430666 786749 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.430674 786749 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001b3ff80 13 D0713 00:08:00.430686 786749 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:08:00.430754 786749 task_signals.go:470] [ 1069: 1069] Notified of signal 23 D0713 00:08:00.430836 786749 task_signals.go:220] [ 1069: 1069] Signal 23: delivering to handler D0713 00:08:00.436388 786749 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.436412 786749 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001b3ff80 14 D0713 00:08:00.436424 786749 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:08:00.436467 786749 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.436486 786749 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.436510 786749 task_signals.go:204] [ 1069: 1070] Signal 1069, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.436522 786749 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.436528 786749 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.436531 786749 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.436546 786749 task_signals.go:204] [ 1069: 1071] Signal 1069, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.436560 786749 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.436566 786749 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.436569 786749 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.436579 786749 task_signals.go:204] [ 1069: 1072] Signal 1069, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.436593 786749 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.436597 786749 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.436601 786749 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.436613 786749 task_signals.go:204] [ 1069: 1073] Signal 1069, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.436632 786749 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.437967 786749 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.438043 786749 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.438072 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.438100 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.438122 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.438181 786749 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.439110 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.440727 786749 syscalls.go:262] [ 1074: 1074] Allocating stack with size of 8388608 bytes D0713 00:08:00.440887 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.442483 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.442544 786749 usertrap_amd64.go:106] [ 1074: 1074] Map a usertrap vma at 61000 D0713 00:08:00.442685 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 1 D0713 00:08:00.442760 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:00.443362 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.443413 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 2 D0713 00:08:00.443436 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:00.444333 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.444461 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 3 D0713 00:08:00.444482 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:00.451777 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.451825 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 4 D0713 00:08:00.451852 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:00.453370 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.453402 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 5 D0713 00:08:00.453415 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:00.453462 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.453483 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 6 D0713 00:08:00.453491 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:00.453924 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.453952 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 7 D0713 00:08:00.453994 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:00.454238 786749 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.454271 786749 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc00170ea20 8 D0713 00:08:00.454289 786749 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:00.454511 786749 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.454531 786749 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc00170ea20 9 D0713 00:08:00.454540 786749 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:00.454612 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.454631 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 10 D0713 00:08:00.454639 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:00.454869 786749 usertrap_amd64.go:212] [ 1074: 1077] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.454934 786749 usertrap_amd64.go:122] [ 1074: 1077] Allocate a new trap: 0xc00170ea20 11 D0713 00:08:00.454959 786749 usertrap_amd64.go:225] [ 1074: 1077] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:00.463944 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.463973 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 12 D0713 00:08:00.463985 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:00.466848 786749 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.466878 786749 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc00170ea20 13 D0713 00:08:00.466890 786749 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:00.466943 786749 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.466954 786749 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc00170ea20 14 D0713 00:08:00.466978 786749 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:00.467004 786749 task_signals.go:470] [ 1074: 1074] Notified of signal 23 D0713 00:08:00.467154 786749 task_signals.go:220] [ 1074: 1074] Signal 23: delivering to handler I0713 00:08:00.475329 786749 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 00:08:00.475430 786749 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.475444 786749 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc00170ea20 15 D0713 00:08:00.475457 786749 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:08:00.475511 786749 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.475645 786749 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.475683 786749 task_signals.go:204] [ 1074: 1076] Signal 1074, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.475721 786749 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.475749 786749 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.475764 786749 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.475786 786749 task_signals.go:204] [ 1074: 1075] Signal 1074, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.475800 786749 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.475809 786749 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.475816 786749 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.475842 786749 task_signals.go:204] [ 1074: 1077] Signal 1074, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.475853 786749 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.475860 786749 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.475866 786749 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.475891 786749 task_signals.go:204] [ 1074: 1078] Signal 1074, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.475910 786749 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.477398 786749 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.477429 786749 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.477449 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.477506 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.477525 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.477700 786749 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.481721 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.482978 786749 syscalls.go:262] [ 1079: 1079] Allocating stack with size of 8388608 bytes D0713 00:08:00.483084 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.484456 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.484509 786749 usertrap_amd64.go:106] [ 1079: 1079] Map a usertrap vma at 62000 D0713 00:08:00.484610 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 1 D0713 00:08:00.484638 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:08:00.485066 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.485100 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 2 D0713 00:08:00.485111 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:08:00.485760 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.485809 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 3 D0713 00:08:00.485821 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:08:00.494564 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.494595 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 4 D0713 00:08:00.494605 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:08:00.495613 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.495644 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 5 D0713 00:08:00.495657 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:08:00.495702 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.495710 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 6 D0713 00:08:00.495718 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:08:00.496091 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.496163 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 7 D0713 00:08:00.496199 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:08:00.496469 786749 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.496498 786749 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc000d4a360 8 D0713 00:08:00.496510 786749 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:08:00.496745 786749 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.496778 786749 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc000d4a360 9 D0713 00:08:00.496790 786749 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:08:00.496893 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.496913 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 10 D0713 00:08:00.496923 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:08:00.505161 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.505208 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 11 D0713 00:08:00.505223 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:08:00.507845 786749 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.507886 786749 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc000d4a360 12 D0713 00:08:00.507900 786749 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:08:00.507946 786749 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.507962 786749 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc000d4a360 13 D0713 00:08:00.507971 786749 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:08:00.508492 786749 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 00:08:00.508623 786749 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler I0713 00:08:00.516310 786749 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 00:08:00.516393 786749 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.516404 786749 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc000d4a360 14 D0713 00:08:00.516418 786749 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:08:00.516489 786749 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.516527 786749 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.516551 786749 task_signals.go:204] [ 1079: 1083] Signal 1079, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.516568 786749 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.516548 786749 task_signals.go:204] [ 1079: 1080] Signal 1079, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.516593 786749 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.516606 786749 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.516582 786749 task_signals.go:204] [ 1079: 1081] Signal 1079, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.516623 786749 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.516631 786749 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.516637 786749 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.516565 786749 task_signals.go:204] [ 1079: 1082] Signal 1079, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.516680 786749 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.516720 786749 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.516728 786749 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.516759 786749 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.518409 786749 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.518497 786749 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.518527 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.518566 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.518600 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.518719 786749 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.519349 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.520795 786749 syscalls.go:262] [ 1084: 1084] Allocating stack with size of 8388608 bytes D0713 00:08:00.520901 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.525497 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.525544 786749 usertrap_amd64.go:106] [ 1084: 1084] Map a usertrap vma at 64000 D0713 00:08:00.525613 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 1 D0713 00:08:00.525651 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:00.527012 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.527043 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 2 D0713 00:08:00.527059 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:00.527942 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.527985 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 3 D0713 00:08:00.527999 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:00.535330 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.535364 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 4 D0713 00:08:00.535381 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:00.536868 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.536903 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 5 D0713 00:08:00.536918 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:00.537350 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.537379 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 6 D0713 00:08:00.537390 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:00.537704 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.537724 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 7 D0713 00:08:00.537734 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:00.537928 786749 usertrap_amd64.go:212] [ 1084: 1085] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.537955 786749 usertrap_amd64.go:122] [ 1084: 1085] Allocate a new trap: 0xc0005de0f0 8 D0713 00:08:00.537968 786749 usertrap_amd64.go:225] [ 1084: 1085] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:00.538263 786749 usertrap_amd64.go:212] [ 1084: 1085] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.538292 786749 usertrap_amd64.go:122] [ 1084: 1085] Allocate a new trap: 0xc0005de0f0 9 D0713 00:08:00.538301 786749 usertrap_amd64.go:225] [ 1084: 1085] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:00.538326 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.538334 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 10 D0713 00:08:00.538341 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:00.546910 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.546952 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 11 D0713 00:08:00.546976 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:00.550037 786749 usertrap_amd64.go:212] [ 1084: 1085] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.550055 786749 usertrap_amd64.go:122] [ 1084: 1085] Allocate a new trap: 0xc0005de0f0 12 D0713 00:08:00.550067 786749 usertrap_amd64.go:225] [ 1084: 1085] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:00.550112 786749 usertrap_amd64.go:212] [ 1084: 1085] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.550170 786749 usertrap_amd64.go:122] [ 1084: 1085] Allocate a new trap: 0xc0005de0f0 13 D0713 00:08:00.550194 786749 usertrap_amd64.go:225] [ 1084: 1085] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:00.550311 786749 task_signals.go:470] [ 1084: 1084] Notified of signal 23 D0713 00:08:00.550398 786749 task_signals.go:220] [ 1084: 1084] Signal 23: delivering to handler D0713 00:08:00.559372 786749 usertrap_amd64.go:212] [ 1084: 1084] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.559415 786749 usertrap_amd64.go:122] [ 1084: 1084] Allocate a new trap: 0xc0005de0f0 14 D0713 00:08:00.559429 786749 usertrap_amd64.go:225] [ 1084: 1084] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:00.559501 786749 task_exit.go:204] [ 1084: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.559562 786749 task_exit.go:204] [ 1084: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.559600 786749 task_signals.go:204] [ 1084: 1087] Signal 1084, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.559620 786749 task_exit.go:204] [ 1084: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.559607 786749 task_signals.go:204] [ 1084: 1086] Signal 1084, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.559629 786749 task_exit.go:204] [ 1084: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.559649 786749 task_exit.go:204] [ 1084: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.559685 786749 task_signals.go:204] [ 1084: 1089] Signal 1084, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.559695 786749 task_signals.go:204] [ 1084: 1085] Signal 1084, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.559727 786749 task_exit.go:204] [ 1084: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.559746 786749 task_signals.go:204] [ 1084: 1088] Signal 1084, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.559771 786749 task_exit.go:204] [ 1084: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.559778 786749 task_exit.go:204] [ 1084: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.559791 786749 task_exit.go:204] [ 1084: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.559807 786749 task_exit.go:204] [ 1084: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.559813 786749 task_exit.go:204] [ 1084: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.559822 786749 task_exit.go:204] [ 1084: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.559830 786749 task_exit.go:204] [ 1084: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.559841 786749 task_exit.go:204] [ 1084: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.559851 786749 task_exit.go:204] [ 1084: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.561395 786749 task_exit.go:204] [ 1084: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.561427 786749 task_exit.go:204] [ 1084: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.561446 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.565074 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.565111 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.565231 786749 task_exit.go:204] [ 1084: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.565786 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.567259 786749 syscalls.go:262] [ 1090: 1090] Allocating stack with size of 8388608 bytes D0713 00:08:00.567391 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.568257 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.568293 786749 usertrap_amd64.go:106] [ 1090: 1090] Map a usertrap vma at 65000 D0713 00:08:00.568387 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 1 D0713 00:08:00.568435 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:00.569573 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.569599 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 2 D0713 00:08:00.569609 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:00.570236 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.570268 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 3 D0713 00:08:00.570282 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:00.577761 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.577795 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 4 D0713 00:08:00.577808 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:00.579060 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.579087 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 5 D0713 00:08:00.579096 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:00.579160 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.579171 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 6 D0713 00:08:00.579176 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:00.579501 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.579526 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 7 D0713 00:08:00.579534 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:00.579753 786749 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.579775 786749 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005de300 8 D0713 00:08:00.579782 786749 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:00.579998 786749 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.580027 786749 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005de300 9 D0713 00:08:00.580041 786749 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:00.580058 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.580065 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 10 D0713 00:08:00.580073 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:00.588237 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.588264 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 11 D0713 00:08:00.588275 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:00.590948 786749 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.591062 786749 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005de300 12 D0713 00:08:00.591120 786749 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:00.591300 786749 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.591315 786749 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0005de300 13 D0713 00:08:00.591332 786749 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:00.591375 786749 task_signals.go:470] [ 1090: 1090] Notified of signal 23 D0713 00:08:00.591422 786749 task_signals.go:220] [ 1090: 1090] Signal 23: delivering to handler D0713 00:08:00.600157 786749 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.600189 786749 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0005de300 14 D0713 00:08:00.600200 786749 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.600263 786749 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.600296 786749 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.600334 786749 task_signals.go:204] [ 1090: 1094] Signal 1090, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.600337 786749 task_signals.go:204] [ 1090: 1091] Signal 1090, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.600337 786749 task_signals.go:204] [ 1090: 1093] Signal 1090, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.600359 786749 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.600387 786749 task_signals.go:204] [ 1090: 1092] Signal 1090, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.600412 786749 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.600428 786749 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.600444 786749 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.600463 786749 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.600470 786749 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.600480 786749 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.600493 786749 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.600742 786749 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.600789 786749 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.602016 786749 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.602054 786749 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.602068 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.602136 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.602173 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.602193 786749 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.603925 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.605504 786749 syscalls.go:262] [ 1095: 1095] Allocating stack with size of 8388608 bytes D0713 00:08:00.605646 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.606704 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.606750 786749 usertrap_amd64.go:106] [ 1095: 1095] Map a usertrap vma at 60000 D0713 00:08:00.606834 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 1 D0713 00:08:00.606865 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:08:00.607484 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.607530 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 2 D0713 00:08:00.607544 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:08:00.608064 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.608085 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 3 D0713 00:08:00.608093 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:08:00.614624 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.614660 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 4 D0713 00:08:00.614670 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:08:00.616107 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.616136 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 5 D0713 00:08:00.616147 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:08:00.616196 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.616216 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 6 D0713 00:08:00.616224 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:08:00.616471 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.616494 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 7 D0713 00:08:00.616500 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:08:00.616627 786749 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.616652 786749 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000d4a720 8 D0713 00:08:00.616659 786749 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:08:00.616843 786749 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.616872 786749 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000d4a720 9 D0713 00:08:00.616882 786749 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:08:00.616909 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.616917 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 10 D0713 00:08:00.616925 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:08:00.617613 786749 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.617643 786749 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000d4a720 11 D0713 00:08:00.617659 786749 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:08:00.617722 786749 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.617765 786749 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000d4a720 12 D0713 00:08:00.617782 786749 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:08:00.617836 786749 task_signals.go:470] [ 1095: 1095] Notified of signal 23 D0713 00:08:00.617891 786749 task_signals.go:220] [ 1095: 1095] Signal 23: delivering to handler D0713 00:08:00.624589 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.624628 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 13 D0713 00:08:00.624644 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:08:00.629199 786749 task_signals.go:470] [ 1095: 1095] Notified of signal 23 D0713 00:08:00.629259 786749 task_signals.go:220] [ 1095: 1095] Signal 23: delivering to handler D0713 00:08:00.636892 786749 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.636962 786749 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000d4a720 14 D0713 00:08:00.636983 786749 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:08:00.637054 786749 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.637088 786749 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.637118 786749 task_signals.go:204] [ 1095: 1098] Signal 1095, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.637107 786749 task_signals.go:204] [ 1095: 1097] Signal 1095, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.637133 786749 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.637143 786749 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.637192 786749 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.637208 786749 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.637224 786749 task_signals.go:204] [ 1095: 1099] Signal 1095, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.637232 786749 task_signals.go:204] [ 1095: 1096] Signal 1095, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.637242 786749 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.637249 786749 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.637258 786749 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.637270 786749 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.637274 786749 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.637282 786749 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.638793 786749 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.638823 786749 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.638838 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.638873 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.638887 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.639074 786749 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.639157 786749 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 00:08:00.639204 786749 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 00:08:00.639709 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.641424 786749 syscalls.go:262] [ 1100: 1100] Allocating stack with size of 8388608 bytes D0713 00:08:00.641571 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.642947 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.642986 786749 usertrap_amd64.go:106] [ 1100: 1100] Map a usertrap vma at 60000 D0713 00:08:00.643075 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 1 D0713 00:08:00.643110 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:08:00.643411 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.643437 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 2 D0713 00:08:00.643448 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:08:00.644056 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.644082 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 3 D0713 00:08:00.644091 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:08:00.650973 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.651014 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 4 D0713 00:08:00.651027 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:08:00.652570 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.652607 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 5 D0713 00:08:00.652622 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:08:00.653033 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.653083 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 6 D0713 00:08:00.653096 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:08:00.653617 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.653643 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 7 D0713 00:08:00.653651 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:08:00.653852 786749 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.653872 786749 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000989b60 8 D0713 00:08:00.653883 786749 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:08:00.654078 786749 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.654095 786749 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000989b60 9 D0713 00:08:00.654108 786749 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:08:00.654181 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.654215 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 10 D0713 00:08:00.654225 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:08:00.664206 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.664249 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 11 D0713 00:08:00.664263 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:08:00.664556 786749 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.664579 786749 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000989b60 12 D0713 00:08:00.664590 786749 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:08:00.664627 786749 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.664681 786749 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000989b60 13 D0713 00:08:00.664700 786749 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:08:00.664749 786749 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0713 00:08:00.664786 786749 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler D0713 00:08:00.675348 786749 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0713 00:08:00.676451 786749 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler D0713 00:08:00.677157 786749 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.677207 786749 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000989b60 14 D0713 00:08:00.677226 786749 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:08:00.677642 786749 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.677706 786749 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.677705 786749 task_signals.go:204] [ 1100: 1101] Signal 1100, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.677738 786749 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.677778 786749 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.677788 786749 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.677817 786749 task_signals.go:204] [ 1100: 1102] Signal 1100, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.677830 786749 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.677840 786749 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.677846 786749 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.677858 786749 task_signals.go:204] [ 1100: 1103] Signal 1100, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.677869 786749 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.677876 786749 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.677889 786749 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.677902 786749 task_signals.go:204] [ 1100: 1104] Signal 1100, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.677910 786749 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.679495 786749 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.679524 786749 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.679547 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.679566 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.679737 786749 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.680572 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.682231 786749 syscalls.go:262] [ 1105: 1105] Allocating stack with size of 8388608 bytes D0713 00:08:00.682691 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.686196 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.686248 786749 usertrap_amd64.go:106] [ 1105: 1105] Map a usertrap vma at 67000 D0713 00:08:00.686325 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 1 D0713 00:08:00.686354 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:00.686851 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.686882 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 2 D0713 00:08:00.686894 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:00.687474 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.687508 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 3 D0713 00:08:00.687522 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:00.694650 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.694676 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 4 D0713 00:08:00.694695 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:00.695987 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.696126 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 5 D0713 00:08:00.696163 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:00.696311 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.696332 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 6 D0713 00:08:00.696342 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:00.696626 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.696652 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 7 D0713 00:08:00.696663 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:00.696878 786749 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.696897 786749 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000d4ac60 8 D0713 00:08:00.696908 786749 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:00.697230 786749 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.697269 786749 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000d4ac60 9 D0713 00:08:00.697292 786749 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:00.697531 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.697562 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 10 D0713 00:08:00.697574 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:00.705776 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.705820 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 11 D0713 00:08:00.705836 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:00.708657 786749 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.708683 786749 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000d4ac60 12 D0713 00:08:00.708695 786749 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:00.708826 786749 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.708850 786749 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000d4ac60 13 D0713 00:08:00.708860 786749 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:00.708924 786749 task_signals.go:470] [ 1105: 1105] Notified of signal 23 D0713 00:08:00.709051 786749 task_signals.go:220] [ 1105: 1105] Signal 23: delivering to handler D0713 00:08:00.717194 786749 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.717220 786749 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000d4ac60 14 D0713 00:08:00.717235 786749 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:00.717365 786749 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717400 786749 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717422 786749 task_signals.go:204] [ 1105: 1107] Signal 1105, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717422 786749 task_signals.go:204] [ 1105: 1109] Signal 1105, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717438 786749 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717438 786749 task_signals.go:204] [ 1105: 1106] Signal 1105, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717445 786749 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717460 786749 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.717416 786749 task_signals.go:204] [ 1105: 1108] Signal 1105, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717513 786749 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717524 786749 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717529 786749 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.717538 786749 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717562 786749 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717569 786749 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.717579 786749 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.718925 786749 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.718943 786749 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.718956 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.719000 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.719010 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.719129 786749 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.719796 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.721657 786749 syscalls.go:262] [ 1110: 1110] Allocating stack with size of 8388608 bytes D0713 00:08:00.721752 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.723679 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.723724 786749 usertrap_amd64.go:106] [ 1110: 1110] Map a usertrap vma at 6a000 D0713 00:08:00.724047 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 1 D0713 00:08:00.724090 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.724435 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.724470 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 2 D0713 00:08:00.724482 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.725057 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.725083 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 3 D0713 00:08:00.725094 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.731338 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.731371 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 4 D0713 00:08:00.731382 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.732801 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.732832 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 5 D0713 00:08:00.732847 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.733057 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.733083 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 6 D0713 00:08:00.733093 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.733531 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.733584 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 7 D0713 00:08:00.733598 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.733870 786749 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.733914 786749 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000d4aea0 8 D0713 00:08:00.733933 786749 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.734287 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.734306 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 9 D0713 00:08:00.734317 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.734328 786749 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.734334 786749 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000d4aea0 10 D0713 00:08:00.734436 786749 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.744009 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.744029 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 11 D0713 00:08:00.744040 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.744776 786749 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.744804 786749 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000d4aea0 12 D0713 00:08:00.744819 786749 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.744862 786749 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.744869 786749 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc000d4aea0 13 D0713 00:08:00.746481 786749 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.746627 786749 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 00:08:00.746731 786749 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 00:08:00.749074 786749 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0713 00:08:00.754759 786749 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.754790 786749 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc000d4aea0 14 D0713 00:08:00.754805 786749 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.754998 786749 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.755039 786749 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.755041 786749 task_signals.go:204] [ 1110: 1111] Signal 1110, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.755060 786749 task_signals.go:204] [ 1110: 1114] Signal 1110, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.755061 786749 task_signals.go:204] [ 1110: 1115] Signal 1110, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.755069 786749 task_signals.go:204] [ 1110: 1113] Signal 1110, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.755078 786749 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.755090 786749 task_signals.go:204] [ 1110: 1112] Signal 1110, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.755105 786749 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.755150 786749 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.755209 786749 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.755234 786749 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.755243 786749 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.755255 786749 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.755263 786749 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.755270 786749 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.755282 786749 task_exit.go:204] [ 1110: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.755288 786749 task_exit.go:204] [ 1110: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.755291 786749 task_exit.go:204] [ 1110: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.755300 786749 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.756872 786749 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.756902 786749 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.756922 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.760436 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.760467 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.760650 786749 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.761367 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.762489 786749 syscalls.go:262] [ 1116: 1116] Allocating stack with size of 8388608 bytes D0713 00:08:00.762590 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.765382 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.765439 786749 usertrap_amd64.go:106] [ 1116: 1116] Map a usertrap vma at 65000 D0713 00:08:00.765577 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 1 D0713 00:08:00.765614 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:00.766078 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.766117 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 2 D0713 00:08:00.766127 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:00.768281 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.768307 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 3 D0713 00:08:00.768316 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:00.775431 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.775467 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 4 D0713 00:08:00.775482 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:00.776683 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.776712 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 5 D0713 00:08:00.776722 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:00.776777 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.776791 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 6 D0713 00:08:00.776796 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:00.777122 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.777153 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 7 D0713 00:08:00.777162 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:00.777320 786749 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.777331 786749 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000d4b0e0 8 D0713 00:08:00.777340 786749 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:00.777507 786749 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.777524 786749 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000d4b0e0 9 D0713 00:08:00.777530 786749 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:00.777679 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.777705 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 10 D0713 00:08:00.777718 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:00.785286 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.785322 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 11 D0713 00:08:00.785336 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:00.787897 786749 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.787931 786749 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000d4b0e0 12 D0713 00:08:00.787945 786749 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:00.787992 786749 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.788001 786749 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000d4b0e0 13 D0713 00:08:00.788013 786749 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:00.788028 786749 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0713 00:08:00.788127 786749 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0713 00:08:00.796056 786749 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.796094 786749 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000d4b0e0 14 D0713 00:08:00.796108 786749 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.796166 786749 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.796187 786749 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.796209 786749 task_signals.go:204] [ 1116: 1117] Signal 1116, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.796220 786749 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.796224 786749 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.796228 786749 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.796242 786749 task_signals.go:204] [ 1116: 1118] Signal 1116, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.796248 786749 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.796252 786749 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.796255 786749 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.796266 786749 task_signals.go:204] [ 1116: 1119] Signal 1116, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.796272 786749 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.796276 786749 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.796279 786749 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.796286 786749 task_signals.go:204] [ 1116: 1120] Signal 1116, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.796293 786749 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.797713 786749 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.797729 786749 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.797740 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.798284 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.798321 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.798443 786749 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.799188 786749 task_stop.go:118] [ 6: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.800862 786749 syscalls.go:262] [ 1121: 1121] Allocating stack with size of 8388608 bytes D0713 00:08:00.801039 786749 task_stop.go:138] [ 6: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.802956 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.802997 786749 usertrap_amd64.go:106] [ 1121: 1121] Map a usertrap vma at 65000 D0713 00:08:00.803115 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 1 D0713 00:08:00.803138 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:00.803611 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.803627 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 2 D0713 00:08:00.803640 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:00.804506 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.804540 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 3 D0713 00:08:00.804553 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:00.811408 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.811443 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 4 D0713 00:08:00.811455 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:00.812873 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.812908 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 5 D0713 00:08:00.812921 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:00.812990 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.813000 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 6 D0713 00:08:00.813010 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:00.813243 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.813267 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 7 D0713 00:08:00.813277 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:00.813416 786749 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.813449 786749 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00170f200 8 D0713 00:08:00.813460 786749 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:00.813640 786749 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.813823 786749 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00170f200 9 D0713 00:08:00.816083 786749 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:00.816141 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.816151 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 10 D0713 00:08:00.816159 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:00.825539 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.825568 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 11 D0713 00:08:00.825578 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:00.828112 786749 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.828137 786749 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00170f200 12 D0713 00:08:00.828149 786749 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:00.828189 786749 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.828204 786749 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00170f200 13 D0713 00:08:00.828214 786749 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:00.828233 786749 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0713 00:08:00.828313 786749 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0713 00:08:00.836915 786749 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.836970 786749 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00170f200 14 D0713 00:08:00.836986 786749 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.837488 786749 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.837522 786749 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.837546 786749 task_signals.go:204] [ 1121: 1122] Signal 1121, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.837560 786749 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.837570 786749 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.837575 786749 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.837593 786749 task_signals.go:204] [ 1121: 1123] Signal 1121, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.837604 786749 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.837611 786749 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.837622 786749 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.837637 786749 task_signals.go:204] [ 1121: 1124] Signal 1121, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.837651 786749 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.837659 786749 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.837666 786749 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.837678 786749 task_signals.go:204] [ 1121: 1125] Signal 1121, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.837690 786749 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.837698 786749 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.837715 786749 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.837685 786749 task_signals.go:204] [ 1121: 1126] Signal 1121, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.837725 786749 task_exit.go:204] [ 1121: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.839215 786749 task_exit.go:204] [ 1121: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.839243 786749 task_exit.go:204] [ 1121: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.839262 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.839289 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.839317 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.839448 786749 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.840188 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.841690 786749 syscalls.go:262] [ 1127: 1127] Allocating stack with size of 8388608 bytes D0713 00:08:00.841787 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.843130 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.843187 786749 usertrap_amd64.go:106] [ 1127: 1127] Map a usertrap vma at 6a000 D0713 00:08:00.843279 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 1 D0713 00:08:00.843319 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.843932 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.843956 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 2 D0713 00:08:00.843966 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.844588 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.844612 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 3 D0713 00:08:00.844621 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.851818 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.851835 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 4 D0713 00:08:00.851844 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.853405 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.853441 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 5 D0713 00:08:00.853457 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.853513 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.853533 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 6 D0713 00:08:00.853540 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.853840 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.853876 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 7 D0713 00:08:00.853890 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.854132 786749 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.854162 786749 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00170f260 8 D0713 00:08:00.854174 786749 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.854344 786749 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.854366 786749 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00170f260 9 D0713 00:08:00.854376 786749 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.854551 786749 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.854578 786749 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00170f260 10 D0713 00:08:00.854589 786749 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.854628 786749 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.854648 786749 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc00170f260 11 D0713 00:08:00.854655 786749 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b04f trap addr 6a370 ([184 234 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.854691 786749 task_signals.go:481] [ 1127: 1127] No task notified of signal 23 D0713 00:08:00.854713 786749 task_signals.go:220] [ 1127: 1127] Signal 23: delivering to handler D0713 00:08:00.854825 786749 task_signals.go:470] [ 1127: 1127] Notified of signal 23 D0713 00:08:00.854890 786749 task_signals.go:220] [ 1127: 1127] Signal 23: delivering to handler D0713 00:08:00.855012 786749 task_signals.go:481] [ 1127: 1127] No task notified of signal 23 D0713 00:08:00.855085 786749 task_signals.go:220] [ 1127: 1127] Signal 23: delivering to handler D0713 00:08:00.855139 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.855160 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 12 D0713 00:08:00.855171 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b57c trap addr 6a3c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.855272 786749 usertrap_amd64.go:212] [ 1127: 1129] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.855294 786749 usertrap_amd64.go:122] [ 1127: 1129] Allocate a new trap: 0xc00170f260 13 D0713 00:08:00.855305 786749 usertrap_amd64.go:225] [ 1127: 1129] Apply the binary patch addr 46b6e0 trap addr 6a410 ([184 24 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.863984 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.864021 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 14 D0713 00:08:00.864032 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.867244 786749 task_signals.go:470] [ 1127: 1127] Notified of signal 23 D0713 00:08:00.867321 786749 task_signals.go:220] [ 1127: 1127] Signal 23: delivering to handler I0713 00:08:00.875319 786749 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 00:08:00.875403 786749 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.875415 786749 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc00170f260 15 D0713 00:08:00.875427 786749 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 00:08:00.875497 786749 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.875516 786749 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.875529 786749 task_signals.go:204] [ 1127: 1128] Signal 1127, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.875537 786749 task_signals.go:204] [ 1127: 1130] Signal 1127, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.875550 786749 task_signals.go:204] [ 1127: 1131] Signal 1127, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.875559 786749 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.875573 786749 task_signals.go:204] [ 1127: 1129] Signal 1127, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.875597 786749 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.875604 786749 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.875615 786749 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.875624 786749 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.875642 786749 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.875653 786749 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.875660 786749 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.875666 786749 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.875674 786749 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.877090 786749 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.877125 786749 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.877143 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.877487 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.877510 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.877604 786749 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.879237 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.880883 786749 syscalls.go:262] [ 1132: 1132] Allocating stack with size of 8388608 bytes D0713 00:08:00.881030 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.883222 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.883265 786749 usertrap_amd64.go:106] [ 1132: 1132] Map a usertrap vma at 64000 D0713 00:08:00.883384 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 1 D0713 00:08:00.883417 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:00.883853 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.883884 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 2 D0713 00:08:00.883897 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:00.884899 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.884931 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 3 D0713 00:08:00.885019 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:00.892995 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.893027 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 4 D0713 00:08:00.893038 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:00.894063 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.894090 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 5 D0713 00:08:00.894101 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:00.894166 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.894185 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 6 D0713 00:08:00.894199 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:00.894481 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.894501 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 7 D0713 00:08:00.894510 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:00.894654 786749 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.894679 786749 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0005de870 8 D0713 00:08:00.894690 786749 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:00.894877 786749 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.894901 786749 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0005de870 9 D0713 00:08:00.894911 786749 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:00.894974 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.894991 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 10 D0713 00:08:00.895001 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:00.902057 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.902089 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 11 D0713 00:08:00.902100 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:00.905319 786749 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.905349 786749 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0005de870 12 D0713 00:08:00.905362 786749 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:00.905458 786749 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.905525 786749 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0005de870 13 D0713 00:08:00.905546 786749 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:00.905646 786749 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0713 00:08:00.905752 786749 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler D0713 00:08:00.912904 786749 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.912929 786749 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0005de870 14 D0713 00:08:00.912968 786749 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:00.913016 786749 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.913042 786749 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.913045 786749 task_signals.go:204] [ 1132: 1134] Signal 1132, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.913062 786749 task_signals.go:204] [ 1132: 1135] Signal 1132, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.913067 786749 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.913064 786749 task_signals.go:204] [ 1132: 1133] Signal 1132, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.913083 786749 task_signals.go:204] [ 1132: 1136] Signal 1132, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.913096 786749 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.913102 786749 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.913115 786749 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.913123 786749 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.913128 786749 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.913154 786749 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.913174 786749 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.913181 786749 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.913191 786749 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.914498 786749 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.914527 786749 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.914539 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.917054 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.917089 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.917151 786749 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.917806 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.919047 786749 syscalls.go:262] [ 1137: 1137] Allocating stack with size of 8388608 bytes D0713 00:08:00.919131 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.920039 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.920074 786749 usertrap_amd64.go:106] [ 1137: 1137] Map a usertrap vma at 63000 D0713 00:08:00.920149 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 1 D0713 00:08:00.920166 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:00.920397 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.920411 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 2 D0713 00:08:00.920417 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:00.921047 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.921072 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 3 D0713 00:08:00.921082 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:00.927139 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.927154 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 4 D0713 00:08:00.927168 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:00.928209 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.928246 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 5 D0713 00:08:00.928259 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:00.928299 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.928319 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 6 D0713 00:08:00.928328 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:00.928811 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.928851 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 7 D0713 00:08:00.928863 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:00.929110 786749 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.929143 786749 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005de9f0 8 D0713 00:08:00.929154 786749 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:00.929292 786749 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.929345 786749 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005de9f0 9 D0713 00:08:00.929358 786749 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:00.929377 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.929385 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 10 D0713 00:08:00.929411 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:00.929941 786749 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.929970 786749 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005de9f0 11 D0713 00:08:00.929980 786749 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:00.930039 786749 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.930059 786749 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0005de9f0 12 D0713 00:08:00.930069 786749 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:00.930142 786749 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0713 00:08:00.930187 786749 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0713 00:08:00.936650 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.936680 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 13 D0713 00:08:00.936692 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:00.940323 786749 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0713 00:08:00.940360 786749 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0713 00:08:00.949450 786749 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.949485 786749 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0005de9f0 14 D0713 00:08:00.949507 786749 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:00.949762 786749 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.949811 786749 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.949838 786749 task_signals.go:204] [ 1137: 1138] Signal 1137, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.949853 786749 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.949862 786749 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.949867 786749 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.949891 786749 task_signals.go:204] [ 1137: 1139] Signal 1137, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.949915 786749 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.949921 786749 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.949927 786749 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.949917 786749 task_signals.go:204] [ 1137: 1140] Signal 1137, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.949944 786749 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.949970 786749 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.949978 786749 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.949994 786749 task_signals.go:204] [ 1137: 1141] Signal 1137, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.950007 786749 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.951493 786749 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.951534 786749 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.951549 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.951589 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.951747 786749 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.952356 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.954474 786749 syscalls.go:262] [ 1142: 1142] Allocating stack with size of 8388608 bytes D0713 00:08:00.954608 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.955738 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.955759 786749 usertrap_amd64.go:106] [ 1142: 1142] Map a usertrap vma at 69000 D0713 00:08:00.955845 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 1 D0713 00:08:00.955874 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:00.956362 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.956392 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 2 D0713 00:08:00.956407 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:00.956926 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.956983 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 3 D0713 00:08:00.956994 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:00.963744 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.963786 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 4 D0713 00:08:00.963801 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:00.965597 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.965627 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 5 D0713 00:08:00.965640 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:00.965669 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.965674 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 6 D0713 00:08:00.965679 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:00.965882 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.965899 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 7 D0713 00:08:00.965905 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:00.966028 786749 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.966048 786749 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0005decf0 8 D0713 00:08:00.966055 786749 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:00.966217 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.966231 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 9 D0713 00:08:00.966242 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:00.966263 786749 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.966270 786749 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0005decf0 10 D0713 00:08:00.966281 786749 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:00.974677 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.974715 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 11 D0713 00:08:00.974730 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:00.977294 786749 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.977323 786749 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0005decf0 12 D0713 00:08:00.977334 786749 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:00.977351 786749 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.977355 786749 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0005decf0 13 D0713 00:08:00.977360 786749 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:00.977376 786749 task_signals.go:470] [ 1142: 1142] Notified of signal 23 D0713 00:08:00.977414 786749 task_signals.go:220] [ 1142: 1142] Signal 23: delivering to handler D0713 00:08:00.985778 786749 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.985805 786749 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0005decf0 14 D0713 00:08:00.985830 786749 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:00.985908 786749 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.985937 786749 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.985968 786749 task_signals.go:204] [ 1142: 1143] Signal 1142, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.985995 786749 task_signals.go:204] [ 1142: 1144] Signal 1142, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.986005 786749 task_signals.go:204] [ 1142: 1146] Signal 1142, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.985965 786749 task_signals.go:204] [ 1142: 1145] Signal 1142, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.986013 786749 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.986201 786749 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.986246 786749 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.986269 786749 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.986284 786749 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.986288 786749 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.986296 786749 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.986302 786749 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.986306 786749 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.986313 786749 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.987832 786749 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.987858 786749 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.987884 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.987918 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.987934 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.988089 786749 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.988717 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.990177 786749 syscalls.go:262] [ 1147: 1147] Allocating stack with size of 8388608 bytes D0713 00:08:00.990299 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.991211 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.991248 786749 usertrap_amd64.go:106] [ 1147: 1147] Map a usertrap vma at 63000 D0713 00:08:00.991399 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 1 D0713 00:08:00.991427 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:00.991754 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.991766 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 2 D0713 00:08:00.991776 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:00.992447 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.992494 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 3 D0713 00:08:00.992532 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:00.999968 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.000000 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 4 D0713 00:08:01.000013 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:01.001296 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.001318 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 5 D0713 00:08:01.001326 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:01.001375 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.001395 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 6 D0713 00:08:01.001405 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:01.001661 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.001676 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 7 D0713 00:08:01.001681 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:01.001779 786749 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.001785 786749 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000989ec0 8 D0713 00:08:01.001790 786749 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:01.001863 786749 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.001878 786749 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000989ec0 9 D0713 00:08:01.001889 786749 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:01.001942 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.001967 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 10 D0713 00:08:01.001978 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:01.002155 786749 usertrap_amd64.go:212] [ 1147: 1150] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:01.002173 786749 usertrap_amd64.go:122] [ 1147: 1150] Allocate a new trap: 0xc000989ec0 11 D0713 00:08:01.002184 786749 usertrap_amd64.go:225] [ 1147: 1150] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:01.002617 786749 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.002667 786749 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000989ec0 12 D0713 00:08:01.002687 786749 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:01.002809 786749 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.002831 786749 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000989ec0 13 D0713 00:08:01.002842 786749 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:01.002864 786749 task_signals.go:470] [ 1147: 1147] Notified of signal 23 D0713 00:08:01.002898 786749 task_signals.go:220] [ 1147: 1147] Signal 23: delivering to handler D0713 00:08:01.009153 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.009184 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 14 D0713 00:08:01.009202 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:01.013563 786749 task_signals.go:470] [ 1147: 1147] Notified of signal 23 D0713 00:08:01.013625 786749 task_signals.go:220] [ 1147: 1147] Signal 23: delivering to handler D0713 00:08:01.019769 786749 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.019802 786749 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000989ec0 15 D0713 00:08:01.019818 786749 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:08:01.019852 786749 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.019877 786749 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.019901 786749 task_signals.go:204] [ 1147: 1148] Signal 1147, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.019917 786749 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.019924 786749 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.019930 786749 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.019947 786749 task_signals.go:204] [ 1147: 1149] Signal 1147, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.019976 786749 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.019983 786749 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.019991 786749 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.020005 786749 task_signals.go:204] [ 1147: 1150] Signal 1147, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.020015 786749 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.020022 786749 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.020030 786749 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.020052 786749 task_signals.go:204] [ 1147: 1151] Signal 1147, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.020065 786749 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.020071 786749 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.020077 786749 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.020089 786749 task_signals.go:204] [ 1147: 1152] Signal 1147, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.020115 786749 task_exit.go:204] [ 1147: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.022541 786749 task_exit.go:204] [ 1147: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.022572 786749 task_exit.go:204] [ 1147: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.022589 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.022630 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.022642 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.022741 786749 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.023339 786749 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.024627 786749 syscalls.go:262] [ 1153: 1153] Allocating stack with size of 8388608 bytes D0713 00:08:01.024728 786749 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.026170 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.026276 786749 usertrap_amd64.go:106] [ 1153: 1153] Map a usertrap vma at 67000 D0713 00:08:01.026351 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 1 D0713 00:08:01.026382 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:01.026669 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.026731 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 2 D0713 00:08:01.026772 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:01.027286 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.027349 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 3 D0713 00:08:01.027364 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:01.036013 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.036044 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 4 D0713 00:08:01.036054 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:01.037109 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.037149 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 5 D0713 00:08:01.037162 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:01.037848 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.037876 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 6 D0713 00:08:01.037885 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:01.038109 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.038134 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 7 D0713 00:08:01.038143 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:01.038420 786749 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.038432 786749 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc000d4b650 8 D0713 00:08:01.038442 786749 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:01.038568 786749 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.038577 786749 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc000d4b650 9 D0713 00:08:01.038585 786749 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:01.038633 786749 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.038657 786749 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc000d4b650 10 D0713 00:08:01.038666 786749 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b020 trap addr 67320 ([184 39 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:01.038738 786749 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.038821 786749 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc000d4b650 11 D0713 00:08:01.038858 786749 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b04f trap addr 67370 ([184 234 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:01.039074 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.039098 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 12 D0713 00:08:01.039108 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b57c trap addr 673c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:01.039129 786749 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 00:08:01.039169 786749 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 00:08:01.047380 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.047409 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 13 D0713 00:08:01.047421 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:01.049559 786749 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 00:08:01.050283 786749 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 00:08:01.051436 786749 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 00:08:01.051573 786749 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 00:08:01.060464 786749 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.060505 786749 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc000d4b650 14 D0713 00:08:01.060528 786749 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:01.060617 786749 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.060662 786749 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.060696 786749 task_signals.go:204] [ 1153: 1154] Signal 1153, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.060741 786749 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.060747 786749 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.060751 786749 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.060766 786749 task_signals.go:204] [ 1153: 1155] Signal 1153, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.060779 786749 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.060787 786749 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.060798 786749 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.060834 786749 task_signals.go:204] [ 1153: 1156] Signal 1153, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.060858 786749 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.060864 786749 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.060870 786749 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.060886 786749 task_signals.go:204] [ 1153: 1157] Signal 1153, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.060910 786749 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.060918 786749 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.060923 786749 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.060935 786749 task_signals.go:204] [ 1153: 1158] Signal 1153, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.060984 786749 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.062762 786749 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.062800 786749 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.062826 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.062887 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.062916 786749 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.064145 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.066087 786749 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0713 00:08:01.066202 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.067675 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.067714 786749 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 64000 D0713 00:08:01.067812 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 1 D0713 00:08:01.067848 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:01.068077 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.068101 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 2 D0713 00:08:01.068110 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:01.068984 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.069019 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 3 D0713 00:08:01.069034 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:01.075868 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.075970 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 4 D0713 00:08:01.076001 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:01.077343 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.077371 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 5 D0713 00:08:01.077381 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:01.077434 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.077466 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 6 D0713 00:08:01.077485 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:01.077756 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.077779 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 7 D0713 00:08:01.077788 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:01.078002 786749 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.078024 786749 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc000d4b8c0 8 D0713 00:08:01.078034 786749 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:01.078244 786749 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.078277 786749 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc000d4b8c0 9 D0713 00:08:01.078290 786749 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:01.078334 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.078353 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 10 D0713 00:08:01.078360 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:01.085950 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.085987 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 11 D0713 00:08:01.086004 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:01.088882 786749 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.088921 786749 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc000d4b8c0 12 D0713 00:08:01.088986 786749 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:01.089058 786749 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.089089 786749 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc000d4b8c0 13 D0713 00:08:01.089099 786749 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:01.089143 786749 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 00:08:01.089230 786749 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 00:08:01.098959 786749 sys_signal.go:495] [ 1159: 1159] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 00:08:01.099166 786749 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.099231 786749 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc000d4b8c0 14 D0713 00:08:01.099264 786749 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:01.099407 786749 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.099480 786749 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.099478 786749 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.099515 786749 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.099635 786749 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.099650 786749 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.099662 786749 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.099677 786749 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.099683 786749 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.099697 786749 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.099761 786749 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.099785 786749 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.099798 786749 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.099806 786749 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.099811 786749 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.099821 786749 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.101461 786749 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.101519 786749 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.101538 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.101723 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.101752 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.101867 786749 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.102417 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.103729 786749 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0713 00:08:01.103884 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.104839 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.104998 786749 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 61000 D0713 00:08:01.105068 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 1 D0713 00:08:01.105090 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:01.105540 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.105567 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 2 D0713 00:08:01.105576 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:01.106193 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.106248 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 3 D0713 00:08:01.106267 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:01.114244 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.114282 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 4 D0713 00:08:01.114321 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:01.115501 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.115546 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 5 D0713 00:08:01.115565 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:01.115621 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.115645 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 6 D0713 00:08:01.115657 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:01.116069 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.116090 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 7 D0713 00:08:01.116101 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:01.116259 786749 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.116283 786749 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d4ba40 8 D0713 00:08:01.116294 786749 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:01.116822 786749 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.116995 786749 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d4ba40 9 D0713 00:08:01.117058 786749 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:01.117104 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.117112 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 10 D0713 00:08:01.117121 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:01.124477 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.124511 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 11 D0713 00:08:01.124523 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:01.127632 786749 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.127671 786749 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d4ba40 12 D0713 00:08:01.127686 786749 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:01.129226 786749 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.129249 786749 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d4ba40 13 D0713 00:08:01.129262 786749 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:01.129313 786749 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 00:08:01.129383 786749 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 00:08:01.134595 786749 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.134629 786749 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d4ba40 14 D0713 00:08:01.134644 786749 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:01.134698 786749 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.134734 786749 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.134738 786749 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.134758 786749 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.134760 786749 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.134766 786749 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.134777 786749 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.134808 786749 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.134827 786749 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.134823 786749 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.134834 786749 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.134853 786749 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.134875 786749 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.134882 786749 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.134894 786749 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.134905 786749 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.136344 786749 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.136369 786749 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.136383 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.136416 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.136428 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.136554 786749 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.136649 786749 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 00:08:01.136689 786749 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 00:08:01.137354 786749 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.138700 786749 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 00:08:01.138812 786749 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.139580 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.139610 786749 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 66000 D0713 00:08:01.139731 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 1 D0713 00:08:01.139756 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:08:01.140017 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.140039 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 2 D0713 00:08:01.140047 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:08:01.140509 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.140534 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 3 D0713 00:08:01.140544 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:08:01.146031 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.146056 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 4 D0713 00:08:01.146067 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:08:01.147204 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.147229 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 5 D0713 00:08:01.147238 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:08:01.147285 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.147293 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 6 D0713 00:08:01.147302 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:08:01.147588 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.147613 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 7 D0713 00:08:01.147623 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:08:01.147788 786749 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.147810 786749 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d4bcb0 8 D0713 00:08:01.147820 786749 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:08:01.147973 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.147998 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 9 D0713 00:08:01.148006 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:08:01.148017 786749 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.148027 786749 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d4bcb0 10 D0713 00:08:01.148034 786749 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:08:01.157389 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.157419 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 11 D0713 00:08:01.157430 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:08:01.160090 786749 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.160138 786749 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d4bcb0 12 D0713 00:08:01.160152 786749 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:08:01.160173 786749 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.160182 786749 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d4bcb0 13 D0713 00:08:01.160190 786749 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:08:01.160207 786749 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 00:08:01.160265 786749 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 00:08:01.169397 786749 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.169531 786749 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d4bcb0 14 D0713 00:08:01.169550 786749 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:08:01.169610 786749 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.169643 786749 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.169642 786749 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.169667 786749 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.169674 786749 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.169685 786749 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.169690 786749 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.169693 786749 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.169701 786749 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.169707 786749 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.169711 786749 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.169720 786749 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.169727 786749 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.169731 786749 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.169735 786749 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.169742 786749 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.171370 786749 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.171405 786749 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.171419 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.171549 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.171586 786749 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.172343 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.173823 786749 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 00:08:01.173950 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.176256 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.176290 786749 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 69000 D0713 00:08:01.176402 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 1 D0713 00:08:01.176429 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:01.176707 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.176729 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 2 D0713 00:08:01.176737 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:01.177204 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.177224 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 3 D0713 00:08:01.177232 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:01.182360 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.182431 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 4 D0713 00:08:01.182474 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:01.184267 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.184288 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 5 D0713 00:08:01.184300 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:01.184388 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.184403 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 6 D0713 00:08:01.184413 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:01.184721 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.184733 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 7 D0713 00:08:01.184742 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:01.184846 786749 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.184854 786749 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00170fe00 8 D0713 00:08:01.184861 786749 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:01.185080 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.185091 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 9 D0713 00:08:01.185101 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:01.185119 786749 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.185125 786749 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00170fe00 10 D0713 00:08:01.185131 786749 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:01.185870 786749 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.185889 786749 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00170fe00 11 D0713 00:08:01.185898 786749 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:01.185920 786749 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.185926 786749 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00170fe00 12 D0713 00:08:01.185933 786749 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:01.185966 786749 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:08:01.185994 786749 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:08:01.198046 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.198079 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 13 D0713 00:08:01.198090 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:01.202441 786749 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:08:01.203618 786749 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:08:01.213757 786749 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:08:01.215485 786749 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:08:01.215974 786749 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.216008 786749 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00170fe00 14 D0713 00:08:01.216033 786749 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:01.216131 786749 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.216163 786749 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.216188 786749 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.216202 786749 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.216208 786749 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.216212 786749 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.216228 786749 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.216236 786749 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.216241 786749 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.216245 786749 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.216254 786749 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.216263 786749 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.216268 786749 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.216272 786749 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.216285 786749 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.216292 786749 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.217720 786749 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.217748 786749 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.217763 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.220863 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.220884 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.223414 786749 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.224024 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.225142 786749 syscalls.go:262] [ 1179: 1179] Allocating stack with size of 8388608 bytes D0713 00:08:01.225226 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.234751 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.234800 786749 usertrap_amd64.go:106] [ 1179: 1179] Map a usertrap vma at 63000 D0713 00:08:01.234944 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 1 D0713 00:08:01.235038 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:01.235562 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.235577 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 2 D0713 00:08:01.235590 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:01.237627 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.237661 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 3 D0713 00:08:01.237677 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:01.251606 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.251652 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 4 D0713 00:08:01.251669 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:01.253619 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.253654 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 5 D0713 00:08:01.253667 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:01.253723 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.253742 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 6 D0713 00:08:01.253750 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:01.254128 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.254156 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 7 D0713 00:08:01.254166 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:01.255611 786749 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.255658 786749 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0005df3b0 8 D0713 00:08:01.255676 786749 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:01.255986 786749 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.256002 786749 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0005df3b0 9 D0713 00:08:01.256013 786749 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:01.256092 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.256103 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 10 D0713 00:08:01.256113 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:01.264354 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.264376 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 11 D0713 00:08:01.264391 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:01.266676 786749 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.266704 786749 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0005df3b0 12 D0713 00:08:01.266716 786749 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:01.266748 786749 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.266755 786749 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0005df3b0 13 D0713 00:08:01.266762 786749 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:01.266779 786749 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 00:08:01.269219 786749 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 00:08:01.277790 786749 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.277828 786749 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0005df3b0 14 D0713 00:08:01.277841 786749 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:01.277898 786749 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.277936 786749 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.277979 786749 task_signals.go:204] [ 1179: 1180] Signal 1179, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.277990 786749 task_signals.go:204] [ 1179: 1183] Signal 1179, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.277997 786749 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.278005 786749 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.278014 786749 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.278019 786749 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.278013 786749 task_signals.go:204] [ 1179: 1181] Signal 1179, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.278028 786749 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.278040 786749 task_signals.go:204] [ 1179: 1182] Signal 1179, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.278051 786749 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.278057 786749 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.278069 786749 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.278075 786749 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.278090 786749 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.279680 786749 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.279711 786749 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.279730 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.279770 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.279790 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.279937 786749 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.280402 786749 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.282358 786749 syscalls.go:262] [ 1184: 1184] Allocating stack with size of 8388608 bytes D0713 00:08:01.282558 786749 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.284150 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.284191 786749 usertrap_amd64.go:106] [ 1184: 1184] Map a usertrap vma at 65000 D0713 00:08:01.284269 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 1 D0713 00:08:01.284307 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:01.284519 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.284542 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 2 D0713 00:08:01.284551 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:01.285390 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.285415 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 3 D0713 00:08:01.285472 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:01.292094 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.292187 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 4 D0713 00:08:01.292251 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:01.293778 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.293800 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 5 D0713 00:08:01.293815 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:01.294016 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.294057 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 6 D0713 00:08:01.294077 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:01.294638 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.294679 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 7 D0713 00:08:01.294693 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:01.294926 786749 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.294956 786749 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0007c4240 8 D0713 00:08:01.294967 786749 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:01.295143 786749 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.295157 786749 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0007c4240 9 D0713 00:08:01.295165 786749 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:01.295332 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.295361 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 10 D0713 00:08:01.295372 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:01.303165 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.303195 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 11 D0713 00:08:01.303206 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:01.306335 786749 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.306365 786749 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0007c4240 12 D0713 00:08:01.306378 786749 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:01.306419 786749 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.306437 786749 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0007c4240 13 D0713 00:08:01.306447 786749 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:01.306510 786749 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 00:08:01.306583 786749 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 00:08:01.316017 786749 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.316050 786749 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0007c4240 14 D0713 00:08:01.316062 786749 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:01.316138 786749 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.316166 786749 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.316195 786749 task_signals.go:204] [ 1184: 1185] Signal 1184, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.316231 786749 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.316227 786749 task_signals.go:204] [ 1184: 1186] Signal 1184, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.316213 786749 task_signals.go:204] [ 1184: 1188] Signal 1184, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.316240 786749 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.316256 786749 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.316207 786749 task_signals.go:204] [ 1184: 1187] Signal 1184, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.316274 786749 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.316283 786749 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.316290 786749 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.316300 786749 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.316307 786749 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.316312 786749 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.316318 786749 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.317776 786749 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.317807 786749 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.317821 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.317866 786749 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.317894 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.318004 786749 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.319634 786749 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.321211 786749 syscalls.go:262] [ 1189: 1189] Allocating stack with size of 8388608 bytes D0713 00:08:01.321334 786749 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.322824 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.322856 786749 usertrap_amd64.go:106] [ 1189: 1189] Map a usertrap vma at 61000 D0713 00:08:01.322919 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 1 D0713 00:08:01.322951 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:01.323164 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.323187 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 2 D0713 00:08:01.323197 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:01.323587 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.323611 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 3 D0713 00:08:01.323628 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) executing program D0713 00:08:01.330673 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.330725 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 4 D0713 00:08:01.330743 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:01.333211 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.333242 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 5 D0713 00:08:01.333253 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:01.333298 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.333307 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 6 D0713 00:08:01.333316 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:01.341550 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.341612 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 7 D0713 00:08:01.341630 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:01.341807 786749 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.341821 786749 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc000bc32c0 8 D0713 00:08:01.341832 786749 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:01.342190 786749 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.342202 786749 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc000bc32c0 9 D0713 00:08:01.342210 786749 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:01.342232 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.342239 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 10 D0713 00:08:01.342247 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:01.343636 786749 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.343653 786749 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc000bc32c0 11 D0713 00:08:01.343663 786749 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:01.343729 786749 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.343745 786749 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc000bc32c0 12 D0713 00:08:01.343756 786749 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:01.343874 786749 task_signals.go:470] [ 1189: 1192] Notified of signal 23 D0713 00:08:01.344007 786749 task_signals.go:220] [ 1189: 1192] Signal 23: delivering to handler D0713 00:08:01.351912 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.351964 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 13 D0713 00:08:01.351981 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:01.355351 786749 task_signals.go:470] [ 1189: 1189] Notified of signal 23 D0713 00:08:01.355418 786749 task_signals.go:220] [ 1189: 1189] Signal 23: delivering to handler D0713 00:08:01.365692 786749 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.365735 786749 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc000bc32c0 14 D0713 00:08:01.365753 786749 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:01.365817 786749 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.365851 786749 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.365882 786749 task_signals.go:204] [ 1189: 1190] Signal 1189, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.365900 786749 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.365908 786749 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.365914 786749 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.365930 786749 task_signals.go:204] [ 1189: 1191] Signal 1189, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.365943 786749 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.365951 786749 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.365957 786749 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.365968 786749 task_signals.go:204] [ 1189: 1192] Signal 1189, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.365975 786749 task_signals.go:204] [ 1189: 1193] Signal 1189, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.365989 786749 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.366011 786749 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.366034 786749 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.366048 786749 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.367923 786749 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.367959 786749 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.367980 786749 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.368039 786749 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.368059 786749 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.368236 786749 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.368359 786749 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 00:08:01.368442 786749 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 00:08:01.369151 786749 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.370597 786749 syscalls.go:262] [ 1194: 1194] Allocating stack with size of 8388608 bytes D0713 00:08:01.370835 786749 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.372336 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.372431 786749 usertrap_amd64.go:106] [ 1194: 1194] Map a usertrap vma at 65000 D0713 00:08:01.372543 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 1 D0713 00:08:01.372568 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:01.373220 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.373278 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 2 D0713 00:08:01.373293 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:01.374205 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.374235 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 3 D0713 00:08:01.374247 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:01.383336 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.383363 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 4 D0713 00:08:01.383375 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:01.384566 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.384585 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 5 D0713 00:08:01.384596 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:01.384641 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.384649 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 6 D0713 00:08:01.384655 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:01.385026 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.385040 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 7 D0713 00:08:01.385049 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:01.385283 786749 usertrap_amd64.go:212] [ 1194: 1196] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.385305 786749 usertrap_amd64.go:122] [ 1194: 1196] Allocate a new trap: 0xc0005de1e0 8 D0713 00:08:01.385316 786749 usertrap_amd64.go:225] [ 1194: 1196] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:01.385468 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.385514 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 9 D0713 00:08:01.385532 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:01.386135 786749 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.386204 786749 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0005de1e0 10 D0713 00:08:01.386230 786749 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:01.393376 786749 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.393420 786749 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0005de1e0 11 D0713 00:08:01.393437 786749 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:01.401164 786749 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.401207 786749 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0005de1e0 12 D0713 00:08:01.401222 786749 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:01.401306 786749 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.401334 786749 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0005de1e0 13 D0713 00:08:01.401347 786749 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:01.401396 786749 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 00:08:01.401499 786749 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 00:08:01.409813 786749 task_signals.go:309] [ 1194: 1194] failed to restore from a signal frame: bad address D0713 00:08:01.409855 786749 task_signals.go:470] [ 1194: 1194] Notified of signal 11 D0713 00:08:01.409868 786749 task_signals.go:220] [ 1194: 1194] Signal 11: delivering to handler W0713 00:08:01.452374 786898 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 00:08:01.452531 786898 main.go:274] Failure to execute command, err: 1 D0713 00:08:01.461904 1 connection.go:127] sock read failed, closing connection: EOF W0713 00:08:01.461936 786697 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0713 00:08:01.462037 1 gofer.go:319] All lisafs servers exited. I0713 00:08:01.462099 1 main.go:265] Exiting with status: 0 D0713 00:08:01.467100 786697 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-test-0 D0713 00:08:01.467193 786697 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-test-0 D0713 00:08:01.467203 786697 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-test-0 D0713 00:08:01.467225 786697 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.467329 786697 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-test-0, PID: 786741 D0713 00:08:01.478827 786697 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.478886 786697 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.478938 786697 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.478950 786697 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.478960 786697 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.478975 786697 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479003 786697 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479026 786697 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479047 786697 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479054 786697 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479244 786697 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479349 786697 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479358 786697 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-cover-test-0" D0713 00:08:01.479367 786697 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-cover-test-0" I0713 00:08:01.479597 786697 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 00:08:01.531838 787273 main.go:230] *************************** I0713 00:08:01.531885 787273 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0713 00:08:01.531912 787273 main.go:232] Version 0.0.0 I0713 00:08:01.531926 787273 main.go:233] GOOS: linux I0713 00:08:01.531946 787273 main.go:234] GOARCH: amd64 I0713 00:08:01.531960 787273 main.go:235] PID: 787273 I0713 00:08:01.531974 787273 main.go:236] UID: 0, GID: 0 I0713 00:08:01.531988 787273 main.go:237] Configuration: I0713 00:08:01.532002 787273 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 00:08:01.532019 787273 main.go:239] Platform: systrap I0713 00:08:01.532052 787273 main.go:240] FileAccess: shared I0713 00:08:01.532081 787273 main.go:241] Directfs: true I0713 00:08:01.532114 787273 main.go:242] Overlay: none I0713 00:08:01.532138 787273 main.go:243] Network: sandbox, logging: false I0713 00:08:01.532161 787273 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:08:01.532192 787273 main.go:245] IOURING: false I0713 00:08:01.532227 787273 main.go:246] Debug: true I0713 00:08:01.532258 787273 main.go:247] Systemd: false I0713 00:08:01.532280 787273 main.go:248] *************************** D0713 00:08:01.532335 787273 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:08:01.532494 787273 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0713 00:08:01.532630 787273 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-test-0"]: exit status 128 I0713 00:08:01.531838 787273 main.go:230] *************************** I0713 00:08:01.531885 787273 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0713 00:08:01.531912 787273 main.go:232] Version 0.0.0 I0713 00:08:01.531926 787273 main.go:233] GOOS: linux I0713 00:08:01.531946 787273 main.go:234] GOARCH: amd64 I0713 00:08:01.531960 787273 main.go:235] PID: 787273 I0713 00:08:01.531974 787273 main.go:236] UID: 0, GID: 0 I0713 00:08:01.531988 787273 main.go:237] Configuration: I0713 00:08:01.532002 787273 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 00:08:01.532019 787273 main.go:239] Platform: systrap I0713 00:08:01.532052 787273 main.go:240] FileAccess: shared I0713 00:08:01.532081 787273 main.go:241] Directfs: true I0713 00:08:01.532114 787273 main.go:242] Overlay: none I0713 00:08:01.532138 787273 main.go:243] Network: sandbox, logging: false I0713 00:08:01.532161 787273 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:08:01.532192 787273 main.go:245] IOURING: false I0713 00:08:01.532227 787273 main.go:246] Debug: true I0713 00:08:01.532258 787273 main.go:247] Systemd: false I0713 00:08:01.532280 787273 main.go:248] *************************** D0713 00:08:01.532335 787273 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:08:01.532494 787273 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0713 00:08:01.532630 787273 main.go:274] Failure to execute command, err: 1 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000