_signals.go:204] [ 597: 601] Signal 597, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.647515 352222 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.647527 352222 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.647721 352222 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.647743 352222 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.648992 352222 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.649030 352222 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.649048 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.649084 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.649109 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.649214 352222 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.649848 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.651309 352222 syscalls.go:262] [ 602: 602] Allocating stack with size of 8388608 bytes D0713 08:45:58.651474 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.652649 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.652686 352222 usertrap_amd64.go:106] [ 602: 602] Map a usertrap vma at 64000 D0713 08:45:58.653216 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 1 D0713 08:45:58.653249 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:58.653916 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.653937 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 2 D0713 08:45:58.653951 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:58.654957 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.655036 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 3 D0713 08:45:58.655061 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:58.662296 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.662363 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 4 D0713 08:45:58.662386 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:58.663570 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.663594 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 5 D0713 08:45:58.663606 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:58.663672 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.663677 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 6 D0713 08:45:58.663682 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:58.664177 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.664198 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 7 D0713 08:45:58.664208 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:58.664367 352222 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.664379 352222 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000970840 8 D0713 08:45:58.664387 352222 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:58.664567 352222 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.664592 352222 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000970840 9 D0713 08:45:58.664603 352222 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:58.664628 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.664638 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 10 D0713 08:45:58.664650 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:58.665016 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:58.665067 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 11 D0713 08:45:58.665093 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:58.673338 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.673365 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 12 D0713 08:45:58.673377 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:58.675912 352222 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.675970 352222 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000970840 13 D0713 08:45:58.675990 352222 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:58.676016 352222 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.676027 352222 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000970840 14 D0713 08:45:58.676033 352222 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:58.676115 352222 task_signals.go:470] [ 602: 602] Notified of signal 23 D0713 08:45:58.676227 352222 task_signals.go:220] [ 602: 602] Signal 23: delivering to handler D0713 08:45:58.684377 352222 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.684413 352222 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000970840 15 D0713 08:45:58.684426 352222 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:58.684499 352222 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.684519 352222 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.684545 352222 task_signals.go:204] [ 602: 605] Signal 602, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.684542 352222 task_signals.go:204] [ 602: 604] Signal 602, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.684567 352222 task_signals.go:204] [ 602: 606] Signal 602, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.684570 352222 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.684569 352222 task_signals.go:204] [ 602: 603] Signal 602, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.684591 352222 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.684612 352222 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.684631 352222 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.684647 352222 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.684653 352222 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.684668 352222 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.684678 352222 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.684685 352222 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.684694 352222 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.686151 352222 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.686164 352222 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.686175 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.686220 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.686239 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.686266 352222 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.688447 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.689863 352222 syscalls.go:262] [ 607: 607] Allocating stack with size of 8388608 bytes D0713 08:45:58.689971 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.691012 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.691047 352222 usertrap_amd64.go:106] [ 607: 607] Map a usertrap vma at 69000 D0713 08:45:58.691126 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 1 D0713 08:45:58.691155 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:58.691666 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.691691 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 2 D0713 08:45:58.691703 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:58.692524 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.692618 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 3 D0713 08:45:58.692642 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:58.698446 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.698472 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 4 D0713 08:45:58.698481 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:58.699825 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.699844 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 5 D0713 08:45:58.699852 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:58.699906 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.699921 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 6 D0713 08:45:58.699928 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:58.700349 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.700365 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 7 D0713 08:45:58.700371 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:58.700464 352222 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.700485 352222 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc000facae0 8 D0713 08:45:58.700492 352222 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:58.700654 352222 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.700673 352222 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc000facae0 9 D0713 08:45:58.700717 352222 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:58.700772 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.700793 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 10 D0713 08:45:58.700805 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:58.701005 352222 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.701029 352222 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc000facae0 11 D0713 08:45:58.701043 352222 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:58.701097 352222 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.701116 352222 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc000facae0 12 D0713 08:45:58.701128 352222 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:58.701184 352222 task_signals.go:470] [ 607: 610] Notified of signal 23 D0713 08:45:58.701227 352222 task_signals.go:179] [ 607: 610] Restarting syscall 202: interrupted by signal 23 D0713 08:45:58.701242 352222 task_signals.go:220] [ 607: 610] Signal 23: delivering to handler D0713 08:45:58.701406 352222 task_signals.go:470] [ 607: 607] Notified of signal 23 D0713 08:45:58.701504 352222 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler D0713 08:45:58.708602 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.708626 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 13 D0713 08:45:58.708638 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:58.712736 352222 task_signals.go:470] [ 607: 607] Notified of signal 23 D0713 08:45:58.712779 352222 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler I0713 08:45:58.719020 352222 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 08:45:58.719094 352222 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.719102 352222 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc000facae0 14 D0713 08:45:58.719110 352222 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:58.719128 352222 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.719163 352222 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.719181 352222 task_signals.go:204] [ 607: 610] Signal 607, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.719198 352222 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.719189 352222 task_signals.go:204] [ 607: 609] Signal 607, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.719203 352222 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.719218 352222 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.719239 352222 task_signals.go:204] [ 607: 608] Signal 607, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.719261 352222 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.719261 352222 task_signals.go:204] [ 607: 611] Signal 607, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.719272 352222 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.719278 352222 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.719287 352222 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.719319 352222 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.719326 352222 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.719341 352222 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.720773 352222 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.720808 352222 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.720821 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.720853 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.720872 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.720961 352222 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.721495 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.723117 352222 syscalls.go:262] [ 612: 612] Allocating stack with size of 8388608 bytes D0713 08:45:58.723215 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.724346 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.724393 352222 usertrap_amd64.go:106] [ 612: 612] Map a usertrap vma at 63000 D0713 08:45:58.724516 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 1 D0713 08:45:58.724542 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:58.724784 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.724801 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 2 D0713 08:45:58.724810 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:58.725713 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.725739 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 3 D0713 08:45:58.725750 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:58.731744 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.731766 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 4 D0713 08:45:58.731775 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:58.732739 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.732754 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 5 D0713 08:45:58.732760 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:58.732772 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.732776 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 6 D0713 08:45:58.732780 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:58.733022 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.733045 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 7 D0713 08:45:58.733055 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:58.733204 352222 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.733216 352222 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000c26960 8 D0713 08:45:58.733227 352222 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:58.733470 352222 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.733496 352222 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000c26960 9 D0713 08:45:58.733509 352222 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:58.733523 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.733530 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 10 D0713 08:45:58.733548 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:58.740732 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.740757 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 11 D0713 08:45:58.740768 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:58.743711 352222 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.743749 352222 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000c26960 12 D0713 08:45:58.743770 352222 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:58.743822 352222 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.743848 352222 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000c26960 13 D0713 08:45:58.743861 352222 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:58.743931 352222 task_signals.go:470] [ 612: 612] Notified of signal 23 D0713 08:45:58.744005 352222 task_signals.go:220] [ 612: 612] Signal 23: delivering to handler I0713 08:45:58.750481 352222 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 08:45:58.750579 352222 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.750595 352222 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000c26960 14 D0713 08:45:58.750605 352222 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:58.750669 352222 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.750681 352222 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.750701 352222 task_signals.go:204] [ 612: 615] Signal 612, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.750714 352222 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.750720 352222 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.750726 352222 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.750711 352222 task_signals.go:204] [ 612: 614] Signal 612, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.750761 352222 task_signals.go:204] [ 612: 613] Signal 612, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.750776 352222 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.750792 352222 task_signals.go:204] [ 612: 616] Signal 612, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.750823 352222 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.750843 352222 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.750857 352222 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.750869 352222 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.750873 352222 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.750881 352222 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.752115 352222 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.752139 352222 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.752156 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.752181 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.752193 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.752349 352222 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.752858 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.754287 352222 syscalls.go:262] [ 617: 617] Allocating stack with size of 8388608 bytes D0713 08:45:58.754370 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.755306 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.755340 352222 usertrap_amd64.go:106] [ 617: 617] Map a usertrap vma at 69000 D0713 08:45:58.755584 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 1 D0713 08:45:58.755612 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:58.755823 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.755840 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 2 D0713 08:45:58.755849 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:58.756224 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.756247 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 3 D0713 08:45:58.756256 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:58.762024 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.762067 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 4 D0713 08:45:58.762077 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:58.763170 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.763194 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 5 D0713 08:45:58.763205 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:58.763251 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.763265 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 6 D0713 08:45:58.763274 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:58.763636 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.763666 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 7 D0713 08:45:58.763679 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:58.763827 352222 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.763846 352222 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000fad020 8 D0713 08:45:58.763853 352222 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:58.764034 352222 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.764056 352222 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000fad020 9 D0713 08:45:58.764064 352222 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:58.764124 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.764142 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 10 D0713 08:45:58.764155 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:58.764703 352222 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.764726 352222 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000fad020 11 D0713 08:45:58.764735 352222 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:58.764782 352222 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.764812 352222 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000fad020 12 D0713 08:45:58.764823 352222 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:58.764858 352222 task_signals.go:470] [ 617: 617] Notified of signal 23 D0713 08:45:58.764879 352222 task_signals.go:220] [ 617: 617] Signal 23: delivering to handler D0713 08:45:58.770380 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.770402 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 13 D0713 08:45:58.770415 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:58.776372 352222 task_signals.go:470] [ 617: 617] Notified of signal 23 D0713 08:45:58.776439 352222 task_signals.go:220] [ 617: 617] Signal 23: delivering to handler I0713 08:45:58.780395 352222 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 08:45:58.780463 352222 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.780477 352222 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000fad020 14 D0713 08:45:58.780487 352222 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:58.780511 352222 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.780530 352222 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.780541 352222 task_signals.go:204] [ 617: 618] Signal 617, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.780546 352222 task_signals.go:204] [ 617: 620] Signal 617, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.780558 352222 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.780565 352222 task_signals.go:204] [ 617: 621] Signal 617, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.780567 352222 task_signals.go:204] [ 617: 619] Signal 617, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.780574 352222 task_signals.go:204] [ 617: 622] Signal 617, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.780585 352222 task_exit.go:204] [ 617: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.780590 352222 task_exit.go:204] [ 617: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.780600 352222 task_exit.go:204] [ 617: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.780613 352222 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.780619 352222 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.780622 352222 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.780630 352222 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.780638 352222 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.780645 352222 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.780650 352222 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.780654 352222 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.780661 352222 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.781636 352222 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.781653 352222 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.781664 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.781705 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.781716 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.781755 352222 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.782303 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.783870 352222 syscalls.go:262] [ 623: 623] Allocating stack with size of 8388608 bytes D0713 08:45:58.783963 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.785529 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.785567 352222 usertrap_amd64.go:106] [ 623: 623] Map a usertrap vma at 6a000 D0713 08:45:58.785674 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 1 D0713 08:45:58.785703 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:58.786175 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.786189 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 2 D0713 08:45:58.786197 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:58.786890 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.786960 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 3 D0713 08:45:58.786979 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:58.793240 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.793270 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 4 D0713 08:45:58.793280 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:58.794432 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.794456 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 5 D0713 08:45:58.794467 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:58.794500 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.794508 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 6 D0713 08:45:58.794515 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:58.794784 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.794799 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 7 D0713 08:45:58.794805 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:58.794914 352222 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.794931 352222 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc000c26b10 8 D0713 08:45:58.794940 352222 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:58.795108 352222 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.795136 352222 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc000c26b10 9 D0713 08:45:58.795149 352222 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:58.795253 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.795278 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 10 D0713 08:45:58.795291 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:58.795408 352222 usertrap_amd64.go:212] [ 623: 626] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:58.795456 352222 usertrap_amd64.go:122] [ 623: 626] Allocate a new trap: 0xc000c26b10 11 D0713 08:45:58.795476 352222 usertrap_amd64.go:225] [ 623: 626] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:58.801717 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.801740 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 12 D0713 08:45:58.801748 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:58.805679 352222 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.805705 352222 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc000c26b10 13 D0713 08:45:58.805716 352222 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:58.805764 352222 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.805790 352222 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc000c26b10 14 D0713 08:45:58.805797 352222 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:58.805814 352222 task_signals.go:470] [ 623: 623] Notified of signal 23 D0713 08:45:58.805844 352222 task_signals.go:220] [ 623: 623] Signal 23: delivering to handler I0713 08:45:58.811337 352222 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 08:45:58.811417 352222 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.811433 352222 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc000c26b10 15 D0713 08:45:58.811442 352222 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:58.811494 352222 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.811513 352222 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.811533 352222 task_signals.go:204] [ 623: 626] Signal 623, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.811564 352222 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.811678 352222 task_signals.go:204] [ 623: 625] Signal 623, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.811717 352222 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.811725 352222 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.811714 352222 task_signals.go:204] [ 623: 627] Signal 623, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.811740 352222 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.811794 352222 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.811800 352222 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.811834 352222 task_signals.go:204] [ 623: 628] Signal 623, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.811856 352222 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.811869 352222 task_signals.go:204] [ 623: 624] Signal 623, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.811883 352222 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.811901 352222 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.811941 352222 task_exit.go:204] [ 623: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.811950 352222 task_exit.go:204] [ 623: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.811955 352222 task_exit.go:204] [ 623: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.811965 352222 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.813080 352222 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.813095 352222 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.813105 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.813152 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.813174 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.813344 352222 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.813697 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.815533 352222 syscalls.go:262] [ 629: 629] Allocating stack with size of 8388608 bytes D0713 08:45:58.815741 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.817256 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.817289 352222 usertrap_amd64.go:106] [ 629: 629] Map a usertrap vma at 6a000 D0713 08:45:58.817358 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 1 D0713 08:45:58.817374 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:58.817770 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.817794 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 2 D0713 08:45:58.817804 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:58.818428 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.818451 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 3 D0713 08:45:58.818459 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:58.823059 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.823074 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 4 D0713 08:45:58.823082 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:58.824034 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.824042 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 5 D0713 08:45:58.824048 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:58.824060 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.824071 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 6 D0713 08:45:58.824082 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:58.824403 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.824431 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 7 D0713 08:45:58.824437 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:58.824561 352222 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.824580 352222 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0001d8e40 8 D0713 08:45:58.824587 352222 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:58.824738 352222 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.824811 352222 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0001d8e40 9 D0713 08:45:58.824833 352222 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:58.824866 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.824874 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 10 D0713 08:45:58.824882 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:58.831986 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.832009 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 11 D0713 08:45:58.832017 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:58.835583 352222 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.835612 352222 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0001d8e40 12 D0713 08:45:58.835624 352222 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:58.835667 352222 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.835682 352222 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0001d8e40 13 D0713 08:45:58.835692 352222 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:58.835735 352222 task_signals.go:470] [ 629: 629] Notified of signal 23 D0713 08:45:58.835817 352222 task_signals.go:220] [ 629: 629] Signal 23: delivering to handler I0713 08:45:58.841479 352222 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 08:45:58.841550 352222 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.841558 352222 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0001d8e40 14 D0713 08:45:58.841565 352222 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:58.841594 352222 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.841622 352222 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.841638 352222 task_signals.go:204] [ 629: 632] Signal 629, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.841652 352222 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.841636 352222 task_signals.go:204] [ 629: 630] Signal 629, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.841660 352222 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.841653 352222 task_signals.go:204] [ 629: 631] Signal 629, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.841665 352222 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.841711 352222 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.841816 352222 task_signals.go:204] [ 629: 633] Signal 629, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.841861 352222 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.841870 352222 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.841892 352222 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.841914 352222 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.841923 352222 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.841943 352222 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.843021 352222 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.843032 352222 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.843041 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.843149 352222 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.843157 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.843191 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.844213 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.845819 352222 syscalls.go:262] [ 634: 634] Allocating stack with size of 8388608 bytes D0713 08:45:58.845927 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.847014 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.847045 352222 usertrap_amd64.go:106] [ 634: 634] Map a usertrap vma at 61000 D0713 08:45:58.847155 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 1 D0713 08:45:58.847180 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:58.847567 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.847584 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 2 D0713 08:45:58.847590 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:58.848198 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.848229 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 3 D0713 08:45:58.848238 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:58.853889 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.853909 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 4 D0713 08:45:58.853923 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:58.854857 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.854876 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 5 D0713 08:45:58.854883 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:58.854894 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.854904 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 6 D0713 08:45:58.854910 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:58.855144 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.855166 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 7 D0713 08:45:58.855174 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:58.855327 352222 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.855351 352222 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc000fadc50 8 D0713 08:45:58.855364 352222 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:58.855551 352222 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.855567 352222 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc000fadc50 9 D0713 08:45:58.855580 352222 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:58.855640 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.855652 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 10 D0713 08:45:58.855658 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:58.864043 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.864062 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 11 D0713 08:45:58.864071 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:58.866744 352222 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.866807 352222 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc000fadc50 12 D0713 08:45:58.866828 352222 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:58.866898 352222 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.866918 352222 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc000fadc50 13 D0713 08:45:58.866931 352222 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:58.867001 352222 task_signals.go:470] [ 634: 634] Notified of signal 23 D0713 08:45:58.867082 352222 task_signals.go:220] [ 634: 634] Signal 23: delivering to handler I0713 08:45:58.875480 352222 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 08:45:58.875604 352222 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.875635 352222 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc000fadc50 14 D0713 08:45:58.875651 352222 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:58.875777 352222 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.875812 352222 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.875844 352222 task_signals.go:204] [ 634: 636] Signal 634, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.875875 352222 task_signals.go:204] [ 634: 635] Signal 634, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.875858 352222 task_signals.go:204] [ 634: 638] Signal 634, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.875888 352222 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.875910 352222 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.875925 352222 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.875947 352222 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.875853 352222 task_signals.go:204] [ 634: 637] Signal 634, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.875969 352222 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.875981 352222 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.876001 352222 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.876021 352222 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.876028 352222 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.876040 352222 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.877605 352222 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.877628 352222 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.877645 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.877696 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.877740 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.877883 352222 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.878045 352222 task_signals.go:470] [ 5: 11] Notified of signal 23 D0713 08:45:58.878132 352222 task_signals.go:220] [ 5: 11] Signal 23: delivering to handler D0713 08:45:58.878545 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.880391 352222 syscalls.go:262] [ 639: 639] Allocating stack with size of 8388608 bytes D0713 08:45:58.880617 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.882081 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.882117 352222 usertrap_amd64.go:106] [ 639: 639] Map a usertrap vma at 66000 D0713 08:45:58.882190 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 1 D0713 08:45:58.882213 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:58.882570 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.882603 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 2 D0713 08:45:58.882617 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:58.883414 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.883447 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 3 D0713 08:45:58.883460 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:58.889777 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.889805 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 4 D0713 08:45:58.889817 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:58.890880 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.890904 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 5 D0713 08:45:58.890912 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:58.890964 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.890975 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 6 D0713 08:45:58.890981 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:58.891280 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.891294 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 7 D0713 08:45:58.891300 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:58.891367 352222 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.891382 352222 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc001585020 8 D0713 08:45:58.891389 352222 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:58.891571 352222 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.891599 352222 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc001585020 9 D0713 08:45:58.891610 352222 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:58.891630 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.891636 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 10 D0713 08:45:58.891641 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:58.899320 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.899350 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 11 D0713 08:45:58.899361 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:58.902390 352222 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.902450 352222 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc001585020 12 D0713 08:45:58.902472 352222 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:58.902506 352222 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.902532 352222 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc001585020 13 D0713 08:45:58.902542 352222 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:58.902589 352222 task_signals.go:470] [ 639: 639] Notified of signal 23 D0713 08:45:58.902674 352222 task_signals.go:220] [ 639: 639] Signal 23: delivering to handler D0713 08:45:58.909966 352222 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.909992 352222 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc001585020 14 D0713 08:45:58.910001 352222 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:58.910068 352222 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.910092 352222 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.910119 352222 task_signals.go:204] [ 639: 642] Signal 639, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.910133 352222 task_signals.go:204] [ 639: 640] Signal 639, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.910146 352222 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.910119 352222 task_signals.go:204] [ 639: 641] Signal 639, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.910154 352222 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.910162 352222 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.910182 352222 task_signals.go:204] [ 639: 643] Signal 639, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.910183 352222 task_signals.go:204] [ 639: 644] Signal 639, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.910195 352222 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.910217 352222 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.910224 352222 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.910234 352222 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.910241 352222 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.910244 352222 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.910264 352222 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.910279 352222 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.910283 352222 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.910290 352222 task_exit.go:204] [ 639: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.912048 352222 task_exit.go:204] [ 639: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.912059 352222 task_exit.go:204] [ 639: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.912075 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.912100 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.912111 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.912171 352222 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.912919 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.914465 352222 syscalls.go:262] [ 645: 645] Allocating stack with size of 8388608 bytes D0713 08:45:58.914603 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.915885 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.915927 352222 usertrap_amd64.go:106] [ 645: 645] Map a usertrap vma at 65000 D0713 08:45:58.916063 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 1 D0713 08:45:58.916090 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:58.916490 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.916509 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 2 D0713 08:45:58.916522 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:58.917001 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.917022 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 3 D0713 08:45:58.917029 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:58.922862 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.922887 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 4 D0713 08:45:58.922896 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:58.923910 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.923930 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 5 D0713 08:45:58.923937 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:58.923948 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.923953 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 6 D0713 08:45:58.923957 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:58.924344 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.924403 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 7 D0713 08:45:58.924425 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:58.924641 352222 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.924657 352222 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc000c27260 8 D0713 08:45:58.924665 352222 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:58.924793 352222 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.924800 352222 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc000c27260 9 D0713 08:45:58.924807 352222 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:58.924840 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.924867 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 10 D0713 08:45:58.924875 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:58.933109 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.933157 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 11 D0713 08:45:58.933172 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:58.935462 352222 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.935477 352222 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc000c27260 12 D0713 08:45:58.935488 352222 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:58.935586 352222 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.935636 352222 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc000c27260 13 D0713 08:45:58.935652 352222 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:58.935716 352222 task_signals.go:470] [ 645: 645] Notified of signal 23 D0713 08:45:58.935809 352222 task_signals.go:220] [ 645: 645] Signal 23: delivering to handler I0713 08:45:58.943547 352222 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 08:45:58.943637 352222 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.943648 352222 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc000c27260 14 D0713 08:45:58.943658 352222 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:58.943692 352222 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.943715 352222 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.943741 352222 task_signals.go:204] [ 645: 648] Signal 645, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.943735 352222 task_signals.go:204] [ 645: 647] Signal 645, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.943770 352222 task_exit.go:204] [ 645: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.943812 352222 task_signals.go:204] [ 645: 649] Signal 645, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.943832 352222 task_signals.go:204] [ 645: 646] Signal 645, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.943857 352222 task_exit.go:204] [ 645: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.943891 352222 task_signals.go:204] [ 645: 650] Signal 645, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.943911 352222 task_exit.go:204] [ 645: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.943918 352222 task_exit.go:204] [ 645: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.943950 352222 task_exit.go:204] [ 645: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.943990 352222 task_exit.go:204] [ 645: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.944004 352222 task_exit.go:204] [ 645: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.944019 352222 task_exit.go:204] [ 645: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.944028 352222 task_exit.go:204] [ 645: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.944032 352222 task_exit.go:204] [ 645: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.944051 352222 task_exit.go:204] [ 645: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.944057 352222 task_exit.go:204] [ 645: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.944080 352222 task_exit.go:204] [ 645: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.945831 352222 task_exit.go:204] [ 645: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.945860 352222 task_exit.go:204] [ 645: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.945875 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.945914 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.945930 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.946066 352222 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.946646 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.948082 352222 syscalls.go:262] [ 651: 651] Allocating stack with size of 8388608 bytes D0713 08:45:58.948348 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.949986 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.950025 352222 usertrap_amd64.go:106] [ 651: 651] Map a usertrap vma at 65000 D0713 08:45:58.950111 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 1 D0713 08:45:58.950141 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:58.950562 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.950585 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 2 D0713 08:45:58.950598 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:58.951334 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.951360 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 3 D0713 08:45:58.951374 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:58.957360 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.957383 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 4 D0713 08:45:58.957394 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:58.958438 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.958448 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 5 D0713 08:45:58.958456 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:58.958471 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.958476 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 6 D0713 08:45:58.958482 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:58.958837 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.958850 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 7 D0713 08:45:58.958856 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:58.958965 352222 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.958987 352222 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0001d99b0 8 D0713 08:45:58.958994 352222 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:58.959148 352222 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.959179 352222 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0001d99b0 9 D0713 08:45:58.959193 352222 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:58.959218 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.959240 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 10 D0713 08:45:58.959249 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:58.959369 352222 usertrap_amd64.go:212] [ 651: 654] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:58.959392 352222 usertrap_amd64.go:122] [ 651: 654] Allocate a new trap: 0xc0001d99b0 11 D0713 08:45:58.959403 352222 usertrap_amd64.go:225] [ 651: 654] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:58.960216 352222 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b020:sysno 39 D0713 08:45:58.960237 352222 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0001d99b0 12 D0713 08:45:58.960246 352222 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:58.960284 352222 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:58.960298 352222 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc0001d99b0 13 D0713 08:45:58.960305 352222 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:58.960326 352222 task_signals.go:470] [ 651: 651] Notified of signal 23 D0713 08:45:58.960366 352222 task_signals.go:220] [ 651: 651] Signal 23: delivering to handler D0713 08:45:58.966414 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.966437 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 14 D0713 08:45:58.966446 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46af29 trap addr 65460 ([184 37 1 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:58.970520 352222 task_signals.go:470] [ 651: 651] Notified of signal 23 D0713 08:45:58.970573 352222 task_signals.go:179] [ 651: 651] Restarting syscall 202: interrupted by signal 23 D0713 08:45:58.970593 352222 task_signals.go:220] [ 651: 651] Signal 23: delivering to handler I0713 08:45:58.976036 352222 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 08:45:58.976132 352222 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:58.976145 352222 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc0001d99b0 15 D0713 08:45:58.976160 352222 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:45:58.976247 352222 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.976266 352222 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.976291 352222 task_signals.go:204] [ 651: 653] Signal 651, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.976334 352222 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.976351 352222 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.976307 352222 task_signals.go:204] [ 651: 652] Signal 651, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.976361 352222 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.976331 352222 task_signals.go:204] [ 651: 655] Signal 651, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.976374 352222 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.976395 352222 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.976299 352222 task_signals.go:204] [ 651: 654] Signal 651, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.976410 352222 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.976434 352222 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.976451 352222 task_signals.go:204] [ 651: 656] Signal 651, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:58.976477 352222 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.976483 352222 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.976492 352222 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.976501 352222 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.976506 352222 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.976513 352222 task_exit.go:204] [ 651: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:58.978170 352222 task_exit.go:204] [ 651: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:58.978198 352222 task_exit.go:204] [ 651: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.978213 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:58.978259 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:58.978290 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:58.978363 352222 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:58.978773 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.980377 352222 syscalls.go:262] [ 657: 657] Allocating stack with size of 8388608 bytes D0713 08:45:58.980490 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:58.981883 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:58.981933 352222 usertrap_amd64.go:106] [ 657: 657] Map a usertrap vma at 67000 D0713 08:45:58.982010 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 1 D0713 08:45:58.982038 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:58.982521 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:58.982548 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 2 D0713 08:45:58.982557 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:58.983185 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:58.983210 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 3 D0713 08:45:58.983223 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:58.989414 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:58.989448 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 4 D0713 08:45:58.989462 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:58.990673 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:58.990699 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 5 D0713 08:45:58.990710 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:58.990833 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b214:sysno 13 D0713 08:45:58.990851 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 6 D0713 08:45:58.990857 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:58.991165 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:58.991193 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 7 D0713 08:45:58.991204 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:58.991383 352222 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:58.991412 352222 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc000971b90 8 D0713 08:45:58.991423 352222 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:58.991690 352222 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46af76:sysno 35 D0713 08:45:58.991711 352222 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc000971b90 9 D0713 08:45:58.991718 352222 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:58.991730 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:58.991758 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 10 D0713 08:45:58.991765 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:58.999201 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46af29:sysno 293 D0713 08:45:58.999225 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 11 D0713 08:45:58.999236 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:59.002857 352222 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.002882 352222 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc000971b90 12 D0713 08:45:59.002896 352222 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:59.003068 352222 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.003099 352222 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc000971b90 13 D0713 08:45:59.003113 352222 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:59.003176 352222 task_signals.go:470] [ 657: 657] Notified of signal 23 D0713 08:45:59.003297 352222 task_signals.go:220] [ 657: 657] Signal 23: delivering to handler I0713 08:45:59.009336 352222 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 08:45:59.009422 352222 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.009432 352222 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc000971b90 14 D0713 08:45:59.009467 352222 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:59.009549 352222 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.009571 352222 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.009602 352222 task_signals.go:204] [ 657: 660] Signal 657, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.009604 352222 task_signals.go:204] [ 657: 659] Signal 657, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.009634 352222 task_signals.go:204] [ 657: 658] Signal 657, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.009645 352222 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.009700 352222 task_signals.go:204] [ 657: 661] Signal 657, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.009729 352222 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.009739 352222 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.009757 352222 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.009769 352222 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.009778 352222 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.009794 352222 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.009810 352222 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.009819 352222 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.009830 352222 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.011316 352222 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.011341 352222 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.011352 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.011387 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.011409 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.011517 352222 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.012084 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.013475 352222 syscalls.go:262] [ 662: 662] Allocating stack with size of 8388608 bytes D0713 08:45:59.013577 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.015240 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.015282 352222 usertrap_amd64.go:106] [ 662: 662] Map a usertrap vma at 61000 D0713 08:45:59.015368 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 1 D0713 08:45:59.015394 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:59.015991 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.016021 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 2 D0713 08:45:59.016033 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:59.016657 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.016677 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 3 D0713 08:45:59.016691 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:59.022612 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.022627 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 4 D0713 08:45:59.022636 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:59.023791 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.023810 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 5 D0713 08:45:59.023817 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:59.023829 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.023833 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 6 D0713 08:45:59.023839 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:59.023981 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.023986 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 7 D0713 08:45:59.023994 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:59.024109 352222 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.024134 352222 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc000971c20 8 D0713 08:45:59.024151 352222 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:59.024330 352222 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.024354 352222 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc000971c20 9 D0713 08:45:59.024371 352222 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:59.024406 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.024429 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 10 D0713 08:45:59.024442 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:59.025113 352222 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.025146 352222 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc000971c20 11 D0713 08:45:59.025162 352222 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:59.025221 352222 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.025232 352222 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc000971c20 12 D0713 08:45:59.025240 352222 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:59.025260 352222 task_signals.go:470] [ 662: 662] Notified of signal 23 D0713 08:45:59.025299 352222 task_signals.go:220] [ 662: 662] Signal 23: delivering to handler D0713 08:45:59.031600 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.031621 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 13 D0713 08:45:59.031629 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:59.035630 352222 task_signals.go:470] [ 662: 662] Notified of signal 23 D0713 08:45:59.035692 352222 task_signals.go:220] [ 662: 662] Signal 23: delivering to handler D0713 08:45:59.041329 352222 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.041346 352222 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc000971c20 14 D0713 08:45:59.041354 352222 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:59.041376 352222 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.041388 352222 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.041404 352222 task_signals.go:204] [ 662: 666] Signal 662, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.041422 352222 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.041429 352222 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.041398 352222 task_signals.go:204] [ 662: 665] Signal 662, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.041432 352222 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.041422 352222 task_signals.go:204] [ 662: 663] Signal 662, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.041440 352222 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.041421 352222 task_signals.go:204] [ 662: 664] Signal 662, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.041455 352222 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.041468 352222 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.041481 352222 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.041510 352222 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.041516 352222 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.041526 352222 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.043209 352222 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.043235 352222 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.043248 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.043276 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.043285 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.043402 352222 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.044042 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.045579 352222 syscalls.go:262] [ 667: 667] Allocating stack with size of 8388608 bytes D0713 08:45:59.045705 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.046940 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.046974 352222 usertrap_amd64.go:106] [ 667: 667] Map a usertrap vma at 64000 D0713 08:45:59.047044 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 1 D0713 08:45:59.047066 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:59.047372 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.047389 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 2 D0713 08:45:59.047395 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:59.047945 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.047971 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 3 D0713 08:45:59.047987 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:59.053628 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.053651 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 4 D0713 08:45:59.053662 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:59.054684 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.054700 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 5 D0713 08:45:59.054711 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:59.054724 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.054729 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 6 D0713 08:45:59.054734 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:59.055020 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.055032 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 7 D0713 08:45:59.055038 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:59.055171 352222 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.055192 352222 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001930cf0 8 D0713 08:45:59.055203 352222 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:59.055376 352222 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.055401 352222 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001930cf0 9 D0713 08:45:59.055412 352222 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:59.055456 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.055479 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 10 D0713 08:45:59.055491 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:59.062522 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.062542 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 11 D0713 08:45:59.062551 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:59.066111 352222 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.066133 352222 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001930cf0 12 D0713 08:45:59.066143 352222 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:59.066160 352222 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.066165 352222 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001930cf0 13 D0713 08:45:59.066170 352222 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:59.066187 352222 task_signals.go:470] [ 667: 667] Notified of signal 23 D0713 08:45:59.066199 352222 task_signals.go:179] [ 667: 667] Restarting syscall 202: interrupted by signal 23 D0713 08:45:59.066204 352222 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 08:45:59.072490 352222 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.072516 352222 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001930cf0 14 D0713 08:45:59.072525 352222 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:59.072580 352222 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.072595 352222 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.072613 352222 task_signals.go:204] [ 667: 670] Signal 667, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.072633 352222 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.072628 352222 task_signals.go:204] [ 667: 671] Signal 667, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.072638 352222 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.072655 352222 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.072610 352222 task_signals.go:204] [ 667: 669] Signal 667, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.072675 352222 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.072690 352222 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.072695 352222 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.072702 352222 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.072714 352222 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.072718 352222 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.072682 352222 task_signals.go:204] [ 667: 668] Signal 667, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.072748 352222 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.074506 352222 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.074550 352222 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.074566 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.074626 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.074652 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.074715 352222 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.075255 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.076590 352222 syscalls.go:262] [ 672: 672] Allocating stack with size of 8388608 bytes D0713 08:45:59.076694 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.078302 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.078350 352222 usertrap_amd64.go:106] [ 672: 672] Map a usertrap vma at 60000 D0713 08:45:59.078466 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 1 D0713 08:45:59.078498 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:59.078807 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.078826 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 2 D0713 08:45:59.078837 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:59.079450 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.079477 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 3 D0713 08:45:59.079492 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:59.085124 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.085152 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 4 D0713 08:45:59.085162 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:59.086272 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.086295 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 5 D0713 08:45:59.086302 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:59.086360 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.086368 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 6 D0713 08:45:59.086375 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:59.086902 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.086919 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 7 D0713 08:45:59.086927 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:59.087075 352222 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.087094 352222 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001c1c9f0 8 D0713 08:45:59.087106 352222 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:59.087370 352222 usertrap_amd64.go:212] [ 672: 674] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.087392 352222 usertrap_amd64.go:122] [ 672: 674] Allocate a new trap: 0xc001c1c9f0 9 D0713 08:45:59.087401 352222 usertrap_amd64.go:225] [ 672: 674] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:59.087448 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.087468 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 10 D0713 08:45:59.087477 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:59.087999 352222 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.088018 352222 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001c1c9f0 11 D0713 08:45:59.088029 352222 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:59.088105 352222 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.088117 352222 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001c1c9f0 12 D0713 08:45:59.088127 352222 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:59.088146 352222 task_signals.go:470] [ 672: 672] Notified of signal 23 D0713 08:45:59.088173 352222 task_signals.go:220] [ 672: 672] Signal 23: delivering to handler D0713 08:45:59.093974 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.094000 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 13 D0713 08:45:59.094009 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:59.098377 352222 task_signals.go:470] [ 672: 672] Notified of signal 23 D0713 08:45:59.099912 352222 task_signals.go:220] [ 672: 672] Signal 23: delivering to handler D0713 08:45:59.103727 352222 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.103759 352222 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001c1c9f0 14 D0713 08:45:59.103771 352222 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:59.103838 352222 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.103873 352222 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.103875 352222 task_signals.go:204] [ 672: 674] Signal 672, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.103900 352222 task_signals.go:204] [ 672: 673] Signal 672, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.103905 352222 task_signals.go:204] [ 672: 675] Signal 672, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.103911 352222 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.103923 352222 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.103935 352222 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.103942 352222 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.103956 352222 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.103965 352222 task_signals.go:204] [ 672: 676] Signal 672, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.103977 352222 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.103980 352222 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.103992 352222 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.104000 352222 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.104022 352222 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.105678 352222 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.105705 352222 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.105718 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.105772 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.105790 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.105891 352222 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.106326 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.107847 352222 syscalls.go:262] [ 677: 677] Allocating stack with size of 8388608 bytes D0713 08:45:59.108047 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.109578 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.109614 352222 usertrap_amd64.go:106] [ 677: 677] Map a usertrap vma at 68000 D0713 08:45:59.109707 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 1 D0713 08:45:59.109727 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:59.110094 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.110117 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 2 D0713 08:45:59.110127 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:59.110637 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.110662 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 3 D0713 08:45:59.110674 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:59.116104 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.116130 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 4 D0713 08:45:59.116141 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:59.117230 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.117245 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 5 D0713 08:45:59.117257 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:59.117322 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.117338 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 6 D0713 08:45:59.117350 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:59.117822 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.117846 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 7 D0713 08:45:59.117859 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:59.118128 352222 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.118158 352222 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc00097ab70 8 D0713 08:45:59.118175 352222 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:59.118439 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.118460 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 9 D0713 08:45:59.118469 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:59.118482 352222 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.118486 352222 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc00097ab70 10 D0713 08:45:59.118493 352222 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:59.125323 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.125338 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 11 D0713 08:45:59.125347 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:59.128814 352222 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.128837 352222 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc00097ab70 12 D0713 08:45:59.128847 352222 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:59.128916 352222 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.128958 352222 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc00097ab70 13 D0713 08:45:59.128971 352222 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:59.129027 352222 task_signals.go:470] [ 677: 677] Notified of signal 23 D0713 08:45:59.129092 352222 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0713 08:45:59.135656 352222 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.135681 352222 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc00097ab70 14 D0713 08:45:59.135691 352222 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:59.135746 352222 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.135765 352222 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.135785 352222 task_signals.go:204] [ 677: 680] Signal 677, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.135796 352222 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.135795 352222 task_signals.go:204] [ 677: 679] Signal 677, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.135811 352222 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.135831 352222 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.135872 352222 task_signals.go:204] [ 677: 681] Signal 677, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.135901 352222 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.135939 352222 task_signals.go:204] [ 677: 678] Signal 677, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.135958 352222 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.135964 352222 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.135977 352222 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.135985 352222 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.135990 352222 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.136004 352222 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.137266 352222 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.137286 352222 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.137296 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.137340 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.137355 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.137484 352222 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.138149 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.139777 352222 syscalls.go:262] [ 682: 682] Allocating stack with size of 8388608 bytes D0713 08:45:59.139875 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.141581 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.141622 352222 usertrap_amd64.go:106] [ 682: 682] Map a usertrap vma at 67000 D0713 08:45:59.141709 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 1 D0713 08:45:59.141736 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:59.142181 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.142207 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 2 D0713 08:45:59.142220 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:59.142963 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.142981 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 3 D0713 08:45:59.142990 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:59.149137 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.149171 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 4 D0713 08:45:59.149188 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:59.150316 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.150345 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 5 D0713 08:45:59.150358 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:59.150413 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.150429 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 6 D0713 08:45:59.150435 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:59.150775 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.150800 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 7 D0713 08:45:59.150808 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:59.151026 352222 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.151049 352222 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc0005cc390 8 D0713 08:45:59.151062 352222 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:59.151279 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.151303 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 9 D0713 08:45:59.151317 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:59.151332 352222 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.151358 352222 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc0005cc390 10 D0713 08:45:59.151370 352222 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:59.151560 352222 usertrap_amd64.go:212] [ 682: 685] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.151588 352222 usertrap_amd64.go:122] [ 682: 685] Allocate a new trap: 0xc0005cc390 11 D0713 08:45:59.151599 352222 usertrap_amd64.go:225] [ 682: 685] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:59.158737 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.158759 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 12 D0713 08:45:59.158767 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:59.162377 352222 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.162406 352222 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc0005cc390 13 D0713 08:45:59.162417 352222 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:59.162470 352222 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.162496 352222 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc0005cc390 14 D0713 08:45:59.162506 352222 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:59.162651 352222 task_signals.go:470] [ 682: 682] Notified of signal 23 D0713 08:45:59.162750 352222 task_signals.go:220] [ 682: 682] Signal 23: delivering to handler D0713 08:45:59.168312 352222 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.168338 352222 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc0005cc390 15 D0713 08:45:59.168348 352222 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:45:59.168410 352222 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.168455 352222 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.168460 352222 task_signals.go:204] [ 682: 684] Signal 682, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.168481 352222 task_signals.go:204] [ 682: 685] Signal 682, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.168496 352222 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.168515 352222 task_signals.go:204] [ 682: 683] Signal 682, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.168542 352222 task_signals.go:204] [ 682: 686] Signal 682, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.168560 352222 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.168579 352222 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.168598 352222 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.168612 352222 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.168621 352222 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.168639 352222 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.168661 352222 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.168670 352222 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.168684 352222 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.170148 352222 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.170199 352222 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.170220 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.170252 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.170266 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.170350 352222 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.170962 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.172670 352222 syscalls.go:262] [ 687: 687] Allocating stack with size of 8388608 bytes D0713 08:45:59.172805 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.174150 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.174196 352222 usertrap_amd64.go:106] [ 687: 687] Map a usertrap vma at 67000 D0713 08:45:59.174255 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 1 D0713 08:45:59.174275 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:59.174537 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.174556 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 2 D0713 08:45:59.174568 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:59.174986 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.175011 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 3 D0713 08:45:59.175021 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:59.181107 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.181131 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 4 D0713 08:45:59.181141 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:59.182526 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.182542 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 5 D0713 08:45:59.182549 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:59.182565 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.182569 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 6 D0713 08:45:59.182574 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:59.182960 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.182991 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 7 D0713 08:45:59.183002 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:59.183169 352222 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.183193 352222 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc000c983f0 8 D0713 08:45:59.183203 352222 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:59.183344 352222 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.183366 352222 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc000c983f0 9 D0713 08:45:59.183376 352222 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:59.183390 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.183399 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 10 D0713 08:45:59.183407 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:59.183533 352222 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.183561 352222 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc000c983f0 11 D0713 08:45:59.183571 352222 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:59.183933 352222 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.183964 352222 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc000c983f0 12 D0713 08:45:59.183979 352222 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:59.184014 352222 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.184031 352222 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc000c983f0 13 D0713 08:45:59.184045 352222 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:59.184172 352222 task_signals.go:470] [ 687: 687] Notified of signal 23 D0713 08:45:59.184246 352222 task_signals.go:220] [ 687: 687] Signal 23: delivering to handler D0713 08:45:59.191008 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.191039 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 14 D0713 08:45:59.191051 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46af29 trap addr 67460 ([184 37 1 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:59.195051 352222 task_signals.go:470] [ 687: 687] Notified of signal 23 D0713 08:45:59.195097 352222 task_signals.go:220] [ 687: 687] Signal 23: delivering to handler D0713 08:45:59.201019 352222 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.201041 352222 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc000c983f0 15 D0713 08:45:59.201050 352222 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:45:59.201104 352222 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.201119 352222 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.201137 352222 task_signals.go:204] [ 687: 690] Signal 687, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.201151 352222 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.201159 352222 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.201162 352222 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.201176 352222 task_signals.go:204] [ 687: 688] Signal 687, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.201184 352222 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.201190 352222 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.201182 352222 task_signals.go:204] [ 687: 691] Signal 687, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.201193 352222 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.201244 352222 task_signals.go:204] [ 687: 689] Signal 687, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.201255 352222 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.201289 352222 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.201304 352222 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.201323 352222 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.202859 352222 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.202894 352222 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.202910 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.202951 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.202968 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.203064 352222 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.203496 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.205255 352222 syscalls.go:262] [ 692: 692] Allocating stack with size of 8388608 bytes D0713 08:45:59.205364 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.206610 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.206630 352222 usertrap_amd64.go:106] [ 692: 692] Map a usertrap vma at 6a000 D0713 08:45:59.206691 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 1 D0713 08:45:59.206712 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:59.207022 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.207036 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 2 D0713 08:45:59.207042 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:59.207613 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.207622 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 3 D0713 08:45:59.207629 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:59.213240 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.213258 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 4 D0713 08:45:59.213271 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:59.214326 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.214334 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 5 D0713 08:45:59.214343 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:59.214377 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.214384 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 6 D0713 08:45:59.214390 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:59.214549 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.214563 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 7 D0713 08:45:59.214568 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:59.214625 352222 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.214636 352222 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00002a4e0 8 D0713 08:45:59.214642 352222 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:59.214737 352222 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.214759 352222 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00002a4e0 9 D0713 08:45:59.214768 352222 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:59.214843 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.214872 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 10 D0713 08:45:59.214885 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:59.222222 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.222251 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 11 D0713 08:45:59.222263 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:59.225736 352222 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.225751 352222 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00002a4e0 12 D0713 08:45:59.225764 352222 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:59.225833 352222 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.225840 352222 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc00002a4e0 13 D0713 08:45:59.225850 352222 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:59.225868 352222 task_signals.go:470] [ 692: 692] Notified of signal 23 D0713 08:45:59.225905 352222 task_signals.go:220] [ 692: 692] Signal 23: delivering to handler D0713 08:45:59.232531 352222 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.232580 352222 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc00002a4e0 14 D0713 08:45:59.232610 352222 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:59.232684 352222 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.232721 352222 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.232725 352222 task_signals.go:204] [ 692: 694] Signal 692, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.232754 352222 task_signals.go:204] [ 692: 693] Signal 692, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.232765 352222 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.232754 352222 task_signals.go:204] [ 692: 696] Signal 692, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.232749 352222 task_signals.go:204] [ 692: 695] Signal 692, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.232778 352222 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.232793 352222 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.232796 352222 task_signals.go:204] [ 692: 697] Signal 692, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.232809 352222 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.232838 352222 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.232858 352222 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.232864 352222 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.232876 352222 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.232900 352222 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.232905 352222 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.232916 352222 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.232921 352222 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.232929 352222 task_exit.go:204] [ 692: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.234431 352222 task_exit.go:204] [ 692: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.234455 352222 task_exit.go:204] [ 692: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.234467 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.234499 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.234507 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.234708 352222 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.234990 352222 task_signals.go:470] [ 5: 12] Notified of signal 23 D0713 08:45:59.235067 352222 task_signals.go:220] [ 5: 12] Signal 23: delivering to handler D0713 08:45:59.235289 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.236759 352222 syscalls.go:262] [ 698: 698] Allocating stack with size of 8388608 bytes D0713 08:45:59.236860 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.238371 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.238398 352222 usertrap_amd64.go:106] [ 698: 698] Map a usertrap vma at 61000 D0713 08:45:59.238514 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 1 D0713 08:45:59.238547 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:59.238963 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.238991 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 2 D0713 08:45:59.239003 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:59.239836 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.239862 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 3 D0713 08:45:59.239872 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:59.245697 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.245721 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 4 D0713 08:45:59.245730 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:59.246737 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.246752 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 5 D0713 08:45:59.246759 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:59.246769 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.246773 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 6 D0713 08:45:59.246778 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:59.246918 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.246936 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 7 D0713 08:45:59.246941 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:59.247069 352222 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.247097 352222 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc00002a570 8 D0713 08:45:59.247109 352222 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:59.247264 352222 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.247295 352222 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc00002a570 9 D0713 08:45:59.247312 352222 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:59.247364 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.247381 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 10 D0713 08:45:59.247390 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:59.247988 352222 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.248014 352222 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc00002a570 11 D0713 08:45:59.248031 352222 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:59.248107 352222 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.248122 352222 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc00002a570 12 D0713 08:45:59.248133 352222 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:59.248151 352222 task_signals.go:470] [ 698: 698] Notified of signal 23 D0713 08:45:59.248204 352222 task_signals.go:220] [ 698: 698] Signal 23: delivering to handler D0713 08:45:59.254356 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.254377 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 13 D0713 08:45:59.254386 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:59.258408 352222 task_signals.go:470] [ 698: 698] Notified of signal 23 D0713 08:45:59.258486 352222 task_signals.go:220] [ 698: 698] Signal 23: delivering to handler I0713 08:45:59.263996 352222 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 08:45:59.264115 352222 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.264129 352222 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc00002a570 14 D0713 08:45:59.264144 352222 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:59.264217 352222 task_exit.go:204] [ 698: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.264246 352222 task_signals.go:204] [ 698: 699] Signal 698, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.264277 352222 task_signals.go:204] [ 698: 702] Signal 698, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.264278 352222 task_signals.go:204] [ 698: 701] Signal 698, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.264316 352222 task_signals.go:204] [ 698: 700] Signal 698, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.264342 352222 task_exit.go:204] [ 698: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.264369 352222 task_signals.go:204] [ 698: 703] Signal 698, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.264376 352222 task_exit.go:204] [ 698: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.264418 352222 task_exit.go:204] [ 698: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.264432 352222 task_exit.go:204] [ 698: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.264444 352222 task_exit.go:204] [ 698: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.264454 352222 task_exit.go:204] [ 698: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.264468 352222 task_exit.go:204] [ 698: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.264492 352222 task_exit.go:204] [ 698: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.264517 352222 task_exit.go:204] [ 698: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.264524 352222 task_exit.go:204] [ 698: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.264538 352222 task_exit.go:204] [ 698: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.264557 352222 task_exit.go:204] [ 698: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.264566 352222 task_exit.go:204] [ 698: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.264601 352222 task_exit.go:204] [ 698: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.266118 352222 task_exit.go:204] [ 698: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.266149 352222 task_exit.go:204] [ 698: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.266167 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.266197 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.266208 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.266335 352222 task_exit.go:204] [ 698: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.266839 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.268309 352222 syscalls.go:262] [ 704: 704] Allocating stack with size of 8388608 bytes D0713 08:45:59.268420 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.269869 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.269896 352222 usertrap_amd64.go:106] [ 704: 704] Map a usertrap vma at 67000 D0713 08:45:59.269966 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 1 D0713 08:45:59.269982 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:59.270873 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.270893 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 2 D0713 08:45:59.270903 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:59.271476 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.271491 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 3 D0713 08:45:59.271497 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:59.277108 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.277132 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 4 D0713 08:45:59.277141 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:59.278245 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.278268 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 5 D0713 08:45:59.278276 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:59.278335 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.278348 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 6 D0713 08:45:59.278354 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:59.278766 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.278793 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 7 D0713 08:45:59.278805 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:59.278940 352222 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.278961 352222 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc001c1d350 8 D0713 08:45:59.278972 352222 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:59.279105 352222 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.279131 352222 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc001c1d350 9 D0713 08:45:59.279142 352222 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:59.279155 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.279162 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 10 D0713 08:45:59.279167 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:59.279664 352222 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.279691 352222 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc001c1d350 11 D0713 08:45:59.279702 352222 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:59.279733 352222 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.279743 352222 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc001c1d350 12 D0713 08:45:59.279750 352222 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:59.279763 352222 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:45:59.279844 352222 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:45:59.286605 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.286620 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 13 D0713 08:45:59.286631 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:59.290016 352222 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:45:59.290115 352222 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:45:59.297935 352222 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.298002 352222 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc001c1d350 14 D0713 08:45:59.298021 352222 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:59.298100 352222 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.298135 352222 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.298148 352222 task_signals.go:204] [ 704: 706] Signal 704, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.298181 352222 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.298208 352222 task_signals.go:204] [ 704: 705] Signal 704, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.298178 352222 task_signals.go:204] [ 704: 707] Signal 704, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.298237 352222 task_signals.go:204] [ 704: 708] Signal 704, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.298269 352222 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.298277 352222 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.298290 352222 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.298298 352222 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.298311 352222 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.298320 352222 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.298327 352222 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.298333 352222 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.298349 352222 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.299783 352222 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.299807 352222 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.299819 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.299850 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.299859 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.299994 352222 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.300670 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.302066 352222 syscalls.go:262] [ 709: 709] Allocating stack with size of 8388608 bytes D0713 08:45:59.302216 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.303730 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.303764 352222 usertrap_amd64.go:106] [ 709: 709] Map a usertrap vma at 69000 D0713 08:45:59.303870 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 1 D0713 08:45:59.303899 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:59.304277 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.304291 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 2 D0713 08:45:59.304302 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:59.304997 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.305029 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 3 D0713 08:45:59.305040 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:59.311411 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.311447 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 4 D0713 08:45:59.311460 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:59.312526 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.312544 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 5 D0713 08:45:59.312551 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:59.312576 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.312580 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 6 D0713 08:45:59.312586 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:59.312967 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.312986 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 7 D0713 08:45:59.312995 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:59.313130 352222 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.313144 352222 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000c98ba0 8 D0713 08:45:59.313149 352222 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:59.313373 352222 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.313387 352222 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000c98ba0 9 D0713 08:45:59.313395 352222 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:59.313522 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.313602 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 10 D0713 08:45:59.313629 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:59.321033 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.321077 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 11 D0713 08:45:59.321093 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:59.324293 352222 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.324335 352222 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000c98ba0 12 D0713 08:45:59.324351 352222 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:59.324401 352222 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.324417 352222 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000c98ba0 13 D0713 08:45:59.324426 352222 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:59.324502 352222 task_signals.go:470] [ 709: 709] Notified of signal 23 D0713 08:45:59.324609 352222 task_signals.go:220] [ 709: 709] Signal 23: delivering to handler D0713 08:45:59.331243 352222 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.331277 352222 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000c98ba0 14 D0713 08:45:59.331290 352222 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:59.331353 352222 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.331368 352222 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.331388 352222 task_signals.go:204] [ 709: 712] Signal 709, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.331386 352222 task_signals.go:204] [ 709: 711] Signal 709, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.331402 352222 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.331422 352222 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.331427 352222 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.331445 352222 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.331453 352222 task_signals.go:204] [ 709: 710] Signal 709, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.331475 352222 task_signals.go:204] [ 709: 713] Signal 709, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.331486 352222 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.331491 352222 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.331499 352222 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.331504 352222 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.331509 352222 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.331524 352222 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.332832 352222 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.332856 352222 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.332869 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.332896 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.332902 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.333035 352222 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.333709 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.335404 352222 syscalls.go:262] [ 714: 714] Allocating stack with size of 8388608 bytes D0713 08:45:59.335558 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.336799 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.336832 352222 usertrap_amd64.go:106] [ 714: 714] Map a usertrap vma at 69000 D0713 08:45:59.336935 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 1 D0713 08:45:59.336993 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:59.337358 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.337381 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 2 D0713 08:45:59.337392 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:59.338178 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.338208 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 3 D0713 08:45:59.338220 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:59.344169 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.344196 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 4 D0713 08:45:59.344206 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:59.345364 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.345384 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 5 D0713 08:45:59.345392 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:59.345412 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.345430 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 6 D0713 08:45:59.345443 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:59.345950 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.345967 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 7 D0713 08:45:59.345980 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:59.346125 352222 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.346154 352222 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc00002b0e0 8 D0713 08:45:59.346167 352222 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:59.346295 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.346320 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 9 D0713 08:45:59.346332 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:59.346391 352222 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.346411 352222 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc00002b0e0 10 D0713 08:45:59.346430 352222 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:59.354029 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.354054 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 11 D0713 08:45:59.354063 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:59.356656 352222 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.356686 352222 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc00002b0e0 12 D0713 08:45:59.356700 352222 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:59.356783 352222 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.356798 352222 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc00002b0e0 13 D0713 08:45:59.356811 352222 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:59.356859 352222 task_signals.go:470] [ 714: 714] Notified of signal 23 D0713 08:45:59.356962 352222 task_signals.go:220] [ 714: 714] Signal 23: delivering to handler D0713 08:45:59.363986 352222 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.364010 352222 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc00002b0e0 14 D0713 08:45:59.364020 352222 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:59.364087 352222 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.364111 352222 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.364130 352222 task_signals.go:204] [ 714: 717] Signal 714, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.364125 352222 task_signals.go:204] [ 714: 716] Signal 714, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.364143 352222 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.364169 352222 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.364198 352222 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.364216 352222 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.364223 352222 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.364229 352222 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.364242 352222 task_signals.go:204] [ 714: 718] Signal 714, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.364261 352222 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.364269 352222 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.364274 352222 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.364287 352222 task_signals.go:204] [ 714: 715] Signal 714, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.364300 352222 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.365737 352222 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.365770 352222 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.365782 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.365808 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.365826 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.365924 352222 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.366562 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.367795 352222 syscalls.go:262] [ 719: 719] Allocating stack with size of 8388608 bytes D0713 08:45:59.368115 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.369026 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.369065 352222 usertrap_amd64.go:106] [ 719: 719] Map a usertrap vma at 60000 D0713 08:45:59.369168 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 1 D0713 08:45:59.369208 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:59.369668 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.369698 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 2 D0713 08:45:59.369709 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:59.370500 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.370519 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 3 D0713 08:45:59.370528 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:59.376357 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.376388 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 4 D0713 08:45:59.376404 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:59.377452 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.377474 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 5 D0713 08:45:59.377485 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:59.377559 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.377575 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 6 D0713 08:45:59.377587 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:59.378278 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.378299 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 7 D0713 08:45:59.378306 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:59.378472 352222 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.378496 352222 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc00002b1a0 8 D0713 08:45:59.378506 352222 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:59.378694 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.378712 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 9 D0713 08:45:59.378720 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:59.378758 352222 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.378771 352222 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc00002b1a0 10 D0713 08:45:59.378776 352222 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:59.385325 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.385350 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 11 D0713 08:45:59.385359 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:59.389198 352222 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.389235 352222 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc00002b1a0 12 D0713 08:45:59.389250 352222 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:59.389320 352222 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.389335 352222 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc00002b1a0 13 D0713 08:45:59.389344 352222 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:59.389399 352222 task_signals.go:470] [ 719: 719] Notified of signal 23 D0713 08:45:59.389590 352222 task_signals.go:220] [ 719: 719] Signal 23: delivering to handler D0713 08:45:59.395106 352222 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.395131 352222 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc00002b1a0 14 D0713 08:45:59.395141 352222 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:59.395205 352222 task_exit.go:204] [ 719: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.395274 352222 task_exit.go:204] [ 719: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.395282 352222 task_signals.go:204] [ 719: 720] Signal 719, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.395307 352222 task_exit.go:204] [ 719: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.395332 352222 task_exit.go:204] [ 719: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.395302 352222 task_signals.go:204] [ 719: 723] Signal 719, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.395339 352222 task_exit.go:204] [ 719: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.395306 352222 task_signals.go:204] [ 719: 722] Signal 719, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.395369 352222 task_exit.go:204] [ 719: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.395377 352222 task_exit.go:204] [ 719: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.395385 352222 task_exit.go:204] [ 719: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.395368 352222 task_signals.go:204] [ 719: 721] Signal 719, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.395398 352222 task_exit.go:204] [ 719: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.395404 352222 task_exit.go:204] [ 719: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.395409 352222 task_exit.go:204] [ 719: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.395419 352222 task_exit.go:204] [ 719: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.397076 352222 task_exit.go:204] [ 719: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.397111 352222 task_exit.go:204] [ 719: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.397121 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.397154 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.397163 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.397261 352222 task_exit.go:204] [ 719: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.397838 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.399408 352222 syscalls.go:262] [ 724: 724] Allocating stack with size of 8388608 bytes D0713 08:45:59.399496 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.400759 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.400780 352222 usertrap_amd64.go:106] [ 724: 724] Map a usertrap vma at 68000 D0713 08:45:59.400895 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 1 D0713 08:45:59.400912 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:59.401508 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.401524 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 2 D0713 08:45:59.401536 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:59.402278 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.402304 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 3 D0713 08:45:59.402314 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:59.408092 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.408121 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 4 D0713 08:45:59.408136 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:59.409217 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.409240 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 5 D0713 08:45:59.409248 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:59.409312 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.409317 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 6 D0713 08:45:59.409321 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:59.409677 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.409691 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 7 D0713 08:45:59.409696 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:59.409807 352222 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.409819 352222 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc001c1dec0 8 D0713 08:45:59.409826 352222 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:59.410063 352222 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.410084 352222 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc001c1dec0 9 D0713 08:45:59.410092 352222 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:59.410150 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.410161 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 10 D0713 08:45:59.410172 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:59.410212 352222 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.410217 352222 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc001c1dec0 11 D0713 08:45:59.410224 352222 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:59.410414 352222 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.410451 352222 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc001c1dec0 12 D0713 08:45:59.410472 352222 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:59.410511 352222 task_signals.go:470] [ 724: 727] Notified of signal 23 D0713 08:45:59.410544 352222 task_signals.go:179] [ 724: 727] Restarting syscall 202: interrupted by signal 23 D0713 08:45:59.410555 352222 task_signals.go:220] [ 724: 727] Signal 23: delivering to handler D0713 08:45:59.410769 352222 task_signals.go:470] [ 724: 724] Notified of signal 23 D0713 08:45:59.410832 352222 task_signals.go:220] [ 724: 724] Signal 23: delivering to handler D0713 08:45:59.416595 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.416626 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 13 D0713 08:45:59.416641 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:59.422043 352222 task_signals.go:470] [ 724: 724] Notified of signal 23 D0713 08:45:59.422734 352222 task_signals.go:220] [ 724: 724] Signal 23: delivering to handler D0713 08:45:59.426602 352222 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.426622 352222 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc001c1dec0 14 D0713 08:45:59.426632 352222 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:59.426690 352222 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.426708 352222 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.426729 352222 task_signals.go:204] [ 724: 727] Signal 724, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.426742 352222 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.426748 352222 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.426752 352222 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.426737 352222 task_signals.go:204] [ 724: 726] Signal 724, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.426762 352222 task_signals.go:204] [ 724: 725] Signal 724, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.426768 352222 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.426791 352222 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.426803 352222 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.426765 352222 task_signals.go:204] [ 724: 728] Signal 724, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.426833 352222 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.426841 352222 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.426846 352222 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.426860 352222 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.428181 352222 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.428198 352222 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.428210 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.428243 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.428257 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.428343 352222 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.429007 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.430442 352222 syscalls.go:262] [ 729: 729] Allocating stack with size of 8388608 bytes D0713 08:45:59.430563 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.432083 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.432122 352222 usertrap_amd64.go:106] [ 729: 729] Map a usertrap vma at 62000 D0713 08:45:59.432240 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 1 D0713 08:45:59.432270 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:59.432560 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.432570 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 2 D0713 08:45:59.432579 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:59.433103 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.433132 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 3 D0713 08:45:59.433139 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:59.439581 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.439616 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 4 D0713 08:45:59.439630 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:59.440825 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.440853 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 5 D0713 08:45:59.440865 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:59.440921 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.440935 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 6 D0713 08:45:59.440971 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:59.441518 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.441541 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 7 D0713 08:45:59.441549 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:59.441715 352222 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.441743 352222 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc00002b5f0 8 D0713 08:45:59.441755 352222 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:59.441867 352222 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.441894 352222 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc00002b5f0 9 D0713 08:45:59.441906 352222 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:59.441983 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.442009 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 10 D0713 08:45:59.442019 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:59.442114 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.442137 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 11 D0713 08:45:59.442145 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:59.449129 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.449151 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 12 D0713 08:45:59.449159 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:59.452419 352222 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.452447 352222 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc00002b5f0 13 D0713 08:45:59.452461 352222 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:59.452529 352222 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.452549 352222 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc00002b5f0 14 D0713 08:45:59.452559 352222 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:59.452724 352222 task_signals.go:470] [ 729: 729] Notified of signal 23 D0713 08:45:59.452953 352222 task_signals.go:220] [ 729: 729] Signal 23: delivering to handler D0713 08:45:59.459516 352222 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 08:45:59.459559 352222 sampler.go:191] Time: Adjusting syscall overhead down to 766 I0713 08:45:59.459953 352222 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 08:45:59.460018 352222 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.460025 352222 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc00002b5f0 15 D0713 08:45:59.460033 352222 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:59.460060 352222 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.460079 352222 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.460103 352222 task_signals.go:204] [ 729: 732] Signal 729, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.460119 352222 task_signals.go:204] [ 729: 733] Signal 729, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.460127 352222 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.460133 352222 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.460136 352222 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.460148 352222 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.460153 352222 task_signals.go:204] [ 729: 730] Signal 729, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.460162 352222 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.460166 352222 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.460174 352222 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.460134 352222 task_signals.go:204] [ 729: 731] Signal 729, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.460180 352222 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.460235 352222 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.460269 352222 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.461833 352222 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.461887 352222 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.461906 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.461960 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.461988 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.462068 352222 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.462564 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.463949 352222 syscalls.go:262] [ 734: 734] Allocating stack with size of 8388608 bytes D0713 08:45:59.464110 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.465216 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.465244 352222 usertrap_amd64.go:106] [ 734: 734] Map a usertrap vma at 66000 D0713 08:45:59.465317 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 1 D0713 08:45:59.465333 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:59.465624 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.465637 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 2 D0713 08:45:59.465643 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:59.466171 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.466213 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 3 D0713 08:45:59.466228 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:59.473098 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.473121 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 4 D0713 08:45:59.473134 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:59.474156 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.474175 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 5 D0713 08:45:59.474185 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:59.474264 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.474283 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 6 D0713 08:45:59.474291 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:59.474722 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.474740 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 7 D0713 08:45:59.474747 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:59.474892 352222 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.474913 352222 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000fa0660 8 D0713 08:45:59.474929 352222 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:59.475097 352222 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.475113 352222 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000fa0660 9 D0713 08:45:59.475120 352222 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:59.475128 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.475132 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 10 D0713 08:45:59.475139 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:59.475310 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.475330 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 11 D0713 08:45:59.475339 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:59.482812 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.482876 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 12 D0713 08:45:59.482893 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:59.485611 352222 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.485631 352222 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000fa0660 13 D0713 08:45:59.485640 352222 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:59.485659 352222 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.485664 352222 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000fa0660 14 D0713 08:45:59.485669 352222 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:59.485734 352222 task_signals.go:470] [ 734: 734] Notified of signal 23 D0713 08:45:59.485810 352222 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler D0713 08:45:59.493586 352222 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.493618 352222 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000fa0660 15 D0713 08:45:59.493631 352222 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:45:59.493743 352222 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.493783 352222 task_signals.go:204] [ 734: 736] Signal 734, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.493814 352222 task_signals.go:204] [ 734: 738] Signal 734, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.493823 352222 task_signals.go:204] [ 734: 737] Signal 734, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.493833 352222 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.493846 352222 task_signals.go:204] [ 734: 735] Signal 734, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.493860 352222 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.493871 352222 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.493883 352222 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.493901 352222 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.493920 352222 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.493923 352222 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.493930 352222 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.493935 352222 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.493938 352222 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.493945 352222 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.495196 352222 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.495218 352222 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.495228 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.495255 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.495273 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.495401 352222 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.495668 352222 task_signals.go:470] [ 5: 12] Notified of signal 23 D0713 08:45:59.495732 352222 task_signals.go:220] [ 5: 12] Signal 23: delivering to handler D0713 08:45:59.496410 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.498051 352222 syscalls.go:262] [ 739: 739] Allocating stack with size of 8388608 bytes D0713 08:45:59.498145 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.499298 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.499393 352222 usertrap_amd64.go:106] [ 739: 739] Map a usertrap vma at 6a000 D0713 08:45:59.499511 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 1 D0713 08:45:59.499569 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:59.500153 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.500173 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 2 D0713 08:45:59.500183 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:59.500769 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.500785 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 3 D0713 08:45:59.500795 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:59.507044 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.507065 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 4 D0713 08:45:59.507074 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:59.508065 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.508089 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 5 D0713 08:45:59.508099 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:59.508204 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.508221 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 6 D0713 08:45:59.508230 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:59.508863 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.508884 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 7 D0713 08:45:59.508893 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:59.509078 352222 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.509098 352222 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0009c41e0 8 D0713 08:45:59.509109 352222 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:59.509373 352222 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.509391 352222 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0009c41e0 9 D0713 08:45:59.509399 352222 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b6e0 trap addr 6a2d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:59.509499 352222 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.509545 352222 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0009c41e0 10 D0713 08:45:59.509564 352222 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:59.509642 352222 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.509690 352222 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0009c41e0 11 D0713 08:45:59.509708 352222 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46af76 trap addr 6a370 ([184 35 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:59.517212 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.517253 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 12 D0713 08:45:59.517269 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:59.521003 352222 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.521051 352222 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0009c41e0 13 D0713 08:45:59.521061 352222 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:59.521149 352222 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.521172 352222 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0009c41e0 14 D0713 08:45:59.521184 352222 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:59.521205 352222 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:45:59.521246 352222 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler I0713 08:45:59.527675 352222 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 08:45:59.527807 352222 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.527834 352222 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0009c41e0 15 D0713 08:45:59.527848 352222 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:59.528052 352222 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.528091 352222 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.528090 352222 task_signals.go:204] [ 739: 741] Signal 739, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.528111 352222 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.528125 352222 task_signals.go:204] [ 739: 743] Signal 739, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.528144 352222 task_signals.go:204] [ 739: 740] Signal 739, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.528158 352222 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.528162 352222 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.528173 352222 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.528188 352222 task_signals.go:204] [ 739: 742] Signal 739, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.528197 352222 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.528200 352222 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.528207 352222 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.528217 352222 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.528221 352222 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.528230 352222 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.529535 352222 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.529557 352222 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.529566 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.529622 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.529653 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.529687 352222 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.530246 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.531755 352222 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0713 08:45:59.531838 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.533147 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.533207 352222 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 68000 D0713 08:45:59.533377 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 1 D0713 08:45:59.533412 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:59.533894 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.533917 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 2 D0713 08:45:59.533929 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:59.534701 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.534734 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 3 D0713 08:45:59.534747 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:59.541276 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.541300 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 4 D0713 08:45:59.541311 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:59.542498 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.542546 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 5 D0713 08:45:59.542562 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:59.542623 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.542638 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 6 D0713 08:45:59.542646 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:59.542993 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.543024 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 7 D0713 08:45:59.543037 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:59.543307 352222 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.543347 352222 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc00002bf20 8 D0713 08:45:59.543365 352222 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:59.543581 352222 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.543607 352222 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc00002bf20 9 D0713 08:45:59.543615 352222 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:59.543717 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.543743 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 10 D0713 08:45:59.543755 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:59.551635 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.551661 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 11 D0713 08:45:59.551671 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:59.554365 352222 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.554390 352222 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc00002bf20 12 D0713 08:45:59.554400 352222 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:59.554438 352222 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.554456 352222 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc00002bf20 13 D0713 08:45:59.554468 352222 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:59.554518 352222 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 08:45:59.554602 352222 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 08:45:59.561543 352222 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.561572 352222 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc00002bf20 14 D0713 08:45:59.561583 352222 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:59.561645 352222 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.561665 352222 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.561689 352222 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.561698 352222 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.561720 352222 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.561718 352222 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.561729 352222 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.561751 352222 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.561781 352222 task_signals.go:204] [ 744: 749] Signal 744, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.561794 352222 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.561793 352222 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.561804 352222 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.561816 352222 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.561861 352222 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.561915 352222 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.561930 352222 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.561951 352222 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.561986 352222 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.561998 352222 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.562007 352222 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.563234 352222 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.563260 352222 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.563274 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.563309 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.563330 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.563423 352222 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.563955 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.565248 352222 syscalls.go:262] [ 750: 750] Allocating stack with size of 8388608 bytes D0713 08:45:59.565345 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.566848 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.566887 352222 usertrap_amd64.go:106] [ 750: 750] Map a usertrap vma at 60000 D0713 08:45:59.566964 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 1 D0713 08:45:59.566986 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:59.567386 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.567405 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 2 D0713 08:45:59.567415 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:59.567908 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.567928 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 3 D0713 08:45:59.567944 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:59.573490 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.573512 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 4 D0713 08:45:59.573520 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:59.574516 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.574526 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 5 D0713 08:45:59.574533 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:59.574544 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.574548 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 6 D0713 08:45:59.574553 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:59.574726 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.574741 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 7 D0713 08:45:59.574747 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:59.574858 352222 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.574880 352222 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000fa0c00 8 D0713 08:45:59.574888 352222 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:59.575074 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.575104 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 9 D0713 08:45:59.575149 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:59.575183 352222 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.575197 352222 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000fa0c00 10 D0713 08:45:59.575205 352222 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:59.575527 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.575533 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 11 D0713 08:45:59.575543 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:59.583087 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.583113 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 12 D0713 08:45:59.583130 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:59.586761 352222 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.586790 352222 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000fa0c00 13 D0713 08:45:59.586801 352222 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:59.586883 352222 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.586902 352222 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000fa0c00 14 D0713 08:45:59.586914 352222 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:59.586973 352222 task_signals.go:470] [ 750: 750] Notified of signal 23 D0713 08:45:59.587061 352222 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler I0713 08:45:59.593630 352222 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 08:45:59.593712 352222 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.593735 352222 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000fa0c00 15 D0713 08:45:59.593745 352222 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 08:45:59.593813 352222 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.593834 352222 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.593853 352222 task_signals.go:204] [ 750: 753] Signal 750, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.593873 352222 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.593872 352222 task_signals.go:204] [ 750: 751] Signal 750, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.593880 352222 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.593889 352222 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.593850 352222 task_signals.go:204] [ 750: 752] Signal 750, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.593902 352222 task_signals.go:204] [ 750: 754] Signal 750, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.593904 352222 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.593921 352222 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.593932 352222 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.593938 352222 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.593949 352222 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.594054 352222 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.594081 352222 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.595231 352222 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.595252 352222 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.595269 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.595295 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.595303 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.595376 352222 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.595821 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.597196 352222 syscalls.go:262] [ 755: 755] Allocating stack with size of 8388608 bytes D0713 08:45:59.597290 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.598660 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.598698 352222 usertrap_amd64.go:106] [ 755: 755] Map a usertrap vma at 68000 D0713 08:45:59.598814 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 1 D0713 08:45:59.598852 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:59.599237 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.599251 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 2 D0713 08:45:59.599261 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:59.599702 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.599722 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 3 D0713 08:45:59.599728 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:59.605310 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.605336 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 4 D0713 08:45:59.605347 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:59.606513 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.606538 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 5 D0713 08:45:59.606549 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:59.606610 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.606618 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 6 D0713 08:45:59.606625 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:59.607012 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.607034 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 7 D0713 08:45:59.607043 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:59.607181 352222 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.607204 352222 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0005cdad0 8 D0713 08:45:59.607215 352222 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:59.607370 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.607393 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 9 D0713 08:45:59.607404 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:59.607436 352222 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.607449 352222 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0005cdad0 10 D0713 08:45:59.607455 352222 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:59.614103 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.614139 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 11 D0713 08:45:59.614149 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:59.618122 352222 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.618148 352222 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0005cdad0 12 D0713 08:45:59.618158 352222 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:59.618222 352222 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.618236 352222 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0005cdad0 13 D0713 08:45:59.618246 352222 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:59.618294 352222 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 08:45:59.618374 352222 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler I0713 08:45:59.623901 352222 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 08:45:59.623977 352222 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.623985 352222 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0005cdad0 14 D0713 08:45:59.623993 352222 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:59.624081 352222 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.624103 352222 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.624124 352222 task_signals.go:204] [ 755: 756] Signal 755, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.624142 352222 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.624147 352222 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.624153 352222 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.624173 352222 task_signals.go:204] [ 755: 759] Signal 755, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.624174 352222 task_signals.go:204] [ 755: 757] Signal 755, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.624208 352222 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.624261 352222 task_signals.go:204] [ 755: 758] Signal 755, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.624301 352222 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.624325 352222 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.624362 352222 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.624375 352222 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.624379 352222 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.624388 352222 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.625526 352222 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.625552 352222 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.625564 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.625605 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.625624 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.625785 352222 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.626223 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.627464 352222 syscalls.go:262] [ 760: 760] Allocating stack with size of 8388608 bytes D0713 08:45:59.627592 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.628564 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.628593 352222 usertrap_amd64.go:106] [ 760: 760] Map a usertrap vma at 69000 D0713 08:45:59.628860 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 1 D0713 08:45:59.628886 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:59.629382 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.629402 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 2 D0713 08:45:59.629434 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:59.630431 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.630463 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 3 D0713 08:45:59.630475 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:59.636248 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.636282 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 4 D0713 08:45:59.636295 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:59.637607 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.637663 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 5 D0713 08:45:59.637679 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:59.637736 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.637770 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 6 D0713 08:45:59.637776 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:59.638162 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.638179 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 7 D0713 08:45:59.638185 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:59.638322 352222 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.638338 352222 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0009c4930 8 D0713 08:45:59.638344 352222 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:59.638530 352222 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.638545 352222 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0009c4930 9 D0713 08:45:59.638553 352222 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:59.638676 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.638710 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 10 D0713 08:45:59.638722 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:59.639096 352222 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.639117 352222 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0009c4930 11 D0713 08:45:59.639124 352222 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:59.639178 352222 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.639197 352222 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0009c4930 12 D0713 08:45:59.639203 352222 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:59.639219 352222 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 08:45:59.639244 352222 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 08:45:59.645654 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.645682 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 13 D0713 08:45:59.645691 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:59.649626 352222 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 08:45:59.649681 352222 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 08:45:59.656010 352222 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.656032 352222 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0009c4930 14 D0713 08:45:59.656041 352222 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:59.656096 352222 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.656111 352222 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.656140 352222 task_signals.go:204] [ 760: 764] Signal 760, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.656136 352222 task_signals.go:204] [ 760: 762] Signal 760, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.656160 352222 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.656154 352222 task_signals.go:204] [ 760: 763] Signal 760, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.656168 352222 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.656173 352222 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.656165 352222 task_signals.go:204] [ 760: 761] Signal 760, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.656187 352222 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.656210 352222 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.656215 352222 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.656225 352222 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.656232 352222 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.656238 352222 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.656250 352222 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.657432 352222 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.657461 352222 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.657472 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.657503 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.657525 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.657631 352222 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.658161 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.659523 352222 syscalls.go:262] [ 765: 765] Allocating stack with size of 8388608 bytes D0713 08:45:59.659631 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.661000 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.661044 352222 usertrap_amd64.go:106] [ 765: 765] Map a usertrap vma at 66000 D0713 08:45:59.661163 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 1 D0713 08:45:59.661205 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:59.661640 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.661661 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 2 D0713 08:45:59.661676 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:59.662058 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.662078 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 3 D0713 08:45:59.662088 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:59.668200 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.668222 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 4 D0713 08:45:59.668230 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:59.669475 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.669504 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 5 D0713 08:45:59.669516 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:59.669579 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.669586 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 6 D0713 08:45:59.669593 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:59.669909 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.669928 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 7 D0713 08:45:59.669935 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:59.670067 352222 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.670083 352222 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000fa1020 8 D0713 08:45:59.670089 352222 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:59.670308 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.670332 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 9 D0713 08:45:59.670341 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:59.670351 352222 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.670357 352222 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000fa1020 10 D0713 08:45:59.670366 352222 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:59.677521 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.677558 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 11 D0713 08:45:59.677569 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:59.681334 352222 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.681362 352222 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000fa1020 12 D0713 08:45:59.681371 352222 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:59.681398 352222 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.681407 352222 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000fa1020 13 D0713 08:45:59.681415 352222 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:59.681439 352222 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 08:45:59.681511 352222 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 08:45:59.688259 352222 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.688286 352222 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000fa1020 14 D0713 08:45:59.688295 352222 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:59.688357 352222 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.688380 352222 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.688401 352222 task_signals.go:204] [ 765: 768] Signal 765, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.688405 352222 task_signals.go:204] [ 765: 766] Signal 765, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.688422 352222 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.688399 352222 task_signals.go:204] [ 765: 767] Signal 765, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.688430 352222 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.688434 352222 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.688454 352222 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.688461 352222 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.688465 352222 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.688458 352222 task_signals.go:204] [ 765: 769] Signal 765, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.688473 352222 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.688514 352222 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.688534 352222 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.688544 352222 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.689874 352222 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.689896 352222 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.689907 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.689939 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.689950 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.690103 352222 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.690584 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.691896 352222 syscalls.go:262] [ 770: 770] Allocating stack with size of 8388608 bytes D0713 08:45:59.691987 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.692918 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.692982 352222 usertrap_amd64.go:106] [ 770: 770] Map a usertrap vma at 60000 D0713 08:45:59.693251 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 1 D0713 08:45:59.693275 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:59.693882 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.693910 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 2 D0713 08:45:59.693921 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:59.694671 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.694691 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 3 D0713 08:45:59.694702 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:59.700385 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.700412 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 4 D0713 08:45:59.700422 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:59.701658 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.701681 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 5 D0713 08:45:59.701691 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:59.701751 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.701769 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 6 D0713 08:45:59.701774 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:59.702132 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.702147 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 7 D0713 08:45:59.702153 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:59.702273 352222 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.702298 352222 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000fa1140 8 D0713 08:45:59.702309 352222 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:59.702575 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.702602 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 9 D0713 08:45:59.702615 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:59.702631 352222 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.702639 352222 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000fa1140 10 D0713 08:45:59.702648 352222 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:59.709895 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.709920 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 11 D0713 08:45:59.709929 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:59.712860 352222 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.712882 352222 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000fa1140 12 D0713 08:45:59.712891 352222 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:59.712909 352222 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.712913 352222 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000fa1140 13 D0713 08:45:59.712919 352222 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:59.712935 352222 task_signals.go:470] [ 770: 770] Notified of signal 23 D0713 08:45:59.712998 352222 task_signals.go:220] [ 770: 770] Signal 23: delivering to handler D0713 08:45:59.720155 352222 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.720181 352222 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000fa1140 14 D0713 08:45:59.720191 352222 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:59.720248 352222 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.720291 352222 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.720314 352222 task_signals.go:204] [ 770: 771] Signal 770, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.720330 352222 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.720338 352222 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.720343 352222 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.720372 352222 task_signals.go:204] [ 770: 772] Signal 770, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.720384 352222 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.720391 352222 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.720404 352222 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.720418 352222 task_signals.go:204] [ 770: 773] Signal 770, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.720435 352222 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.720441 352222 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.720447 352222 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.720461 352222 task_signals.go:204] [ 770: 774] Signal 770, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.720480 352222 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.722047 352222 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.722081 352222 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.722092 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.722124 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.722144 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.722168 352222 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.722313 352222 task_signals.go:470] [ 5: 12] Notified of signal 23 D0713 08:45:59.722354 352222 task_signals.go:220] [ 5: 12] Signal 23: delivering to handler D0713 08:45:59.722694 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.724245 352222 syscalls.go:262] [ 775: 775] Allocating stack with size of 8388608 bytes D0713 08:45:59.724355 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.726067 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.726110 352222 usertrap_amd64.go:106] [ 775: 775] Map a usertrap vma at 64000 D0713 08:45:59.726206 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 1 D0713 08:45:59.726242 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:59.726689 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.726720 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 2 D0713 08:45:59.726734 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:59.727493 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.727514 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 3 D0713 08:45:59.727522 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:59.734438 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.734469 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 4 D0713 08:45:59.734480 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:59.735661 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.735697 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 5 D0713 08:45:59.735709 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:59.735765 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.735775 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 6 D0713 08:45:59.735785 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:59.736040 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.736060 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 7 D0713 08:45:59.736068 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:59.736253 352222 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.736287 352222 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc00243c630 8 D0713 08:45:59.736298 352222 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:59.736431 352222 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.736458 352222 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc00243c630 9 D0713 08:45:59.736472 352222 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:59.736489 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.736498 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 10 D0713 08:45:59.736513 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:59.744164 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.744180 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 11 D0713 08:45:59.744189 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:59.746953 352222 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.747034 352222 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc00243c630 12 D0713 08:45:59.747059 352222 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:59.747130 352222 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.747149 352222 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc00243c630 13 D0713 08:45:59.747160 352222 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:59.747241 352222 task_signals.go:470] [ 775: 775] Notified of signal 23 D0713 08:45:59.747350 352222 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0713 08:45:59.755699 352222 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.755726 352222 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc00243c630 14 D0713 08:45:59.755737 352222 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:59.755860 352222 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.755926 352222 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.755947 352222 task_signals.go:204] [ 775: 779] Signal 775, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.755965 352222 task_signals.go:204] [ 775: 777] Signal 775, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.755984 352222 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.756002 352222 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.756009 352222 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.756026 352222 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.756035 352222 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.756040 352222 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.756058 352222 task_signals.go:204] [ 775: 778] Signal 775, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.756081 352222 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.756089 352222 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.756094 352222 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.756134 352222 task_signals.go:204] [ 775: 776] Signal 775, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.756198 352222 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.757696 352222 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.757746 352222 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.757769 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.757825 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.757837 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.757928 352222 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.758574 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.760230 352222 syscalls.go:262] [ 780: 780] Allocating stack with size of 8388608 bytes D0713 08:45:59.760399 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.761530 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.761570 352222 usertrap_amd64.go:106] [ 780: 780] Map a usertrap vma at 66000 D0713 08:45:59.761672 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 1 D0713 08:45:59.761693 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:59.762140 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.762166 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 2 D0713 08:45:59.762176 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:59.762756 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.762773 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 3 D0713 08:45:59.762784 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:59.769189 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.769212 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 4 D0713 08:45:59.769224 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:59.770526 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.770545 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 5 D0713 08:45:59.770556 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:59.770617 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.770631 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 6 D0713 08:45:59.770641 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:59.771046 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.771064 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 7 D0713 08:45:59.771074 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:59.771249 352222 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.771272 352222 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0009c4f00 8 D0713 08:45:59.771282 352222 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:59.771395 352222 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.771417 352222 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0009c4f00 9 D0713 08:45:59.771428 352222 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:59.771564 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.771589 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 10 D0713 08:45:59.771600 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:59.778503 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.778522 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 11 D0713 08:45:59.778532 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:59.782207 352222 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.782235 352222 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0009c4f00 12 D0713 08:45:59.782249 352222 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:59.782267 352222 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.782274 352222 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0009c4f00 13 D0713 08:45:59.782282 352222 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:59.782376 352222 task_signals.go:470] [ 780: 780] Notified of signal 23 D0713 08:45:59.782467 352222 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0713 08:45:59.789199 352222 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.789222 352222 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0009c4f00 14 D0713 08:45:59.789231 352222 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:59.789299 352222 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.789315 352222 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.789336 352222 task_signals.go:204] [ 780: 781] Signal 780, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.789354 352222 task_signals.go:204] [ 780: 782] Signal 780, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.789357 352222 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.789359 352222 task_signals.go:204] [ 780: 784] Signal 780, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.789337 352222 task_signals.go:204] [ 780: 783] Signal 780, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.789373 352222 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.789396 352222 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.789409 352222 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.789424 352222 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.789431 352222 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.789441 352222 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.789476 352222 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.789499 352222 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.789509 352222 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.790911 352222 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.790935 352222 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.790949 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.790987 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.791000 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.791125 352222 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.791664 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.792895 352222 syscalls.go:262] [ 785: 785] Allocating stack with size of 8388608 bytes D0713 08:45:59.793004 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.794655 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.794684 352222 usertrap_amd64.go:106] [ 785: 785] Map a usertrap vma at 66000 D0713 08:45:59.794783 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 1 D0713 08:45:59.794808 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:59.795170 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.795190 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 2 D0713 08:45:59.795200 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:59.795646 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.795661 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 3 D0713 08:45:59.795668 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:59.801878 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.801904 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 4 D0713 08:45:59.801914 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:59.803150 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.803168 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 5 D0713 08:45:59.803174 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:59.803189 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.803196 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 6 D0713 08:45:59.803203 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:59.803551 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.803565 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 7 D0713 08:45:59.803571 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:59.803663 352222 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.803688 352222 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0009c5710 8 D0713 08:45:59.803698 352222 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:59.803881 352222 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.803922 352222 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0009c5710 9 D0713 08:45:59.803940 352222 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:59.803970 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.803985 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 10 D0713 08:45:59.804055 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:59.811184 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.811206 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 11 D0713 08:45:59.811214 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:59.814942 352222 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.814966 352222 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0009c5710 12 D0713 08:45:59.814976 352222 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:59.814992 352222 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.814998 352222 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0009c5710 13 D0713 08:45:59.815018 352222 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:59.815095 352222 task_signals.go:470] [ 785: 785] Notified of signal 23 D0713 08:45:59.815225 352222 task_signals.go:220] [ 785: 785] Signal 23: delivering to handler D0713 08:45:59.821560 352222 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.821586 352222 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0009c5710 14 D0713 08:45:59.821595 352222 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:59.821611 352222 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.821622 352222 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.821638 352222 task_signals.go:204] [ 785: 788] Signal 785, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.821636 352222 task_signals.go:204] [ 785: 787] Signal 785, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.821647 352222 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.821679 352222 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.821687 352222 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.821645 352222 task_signals.go:204] [ 785: 786] Signal 785, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.821698 352222 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.821718 352222 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.821745 352222 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.821761 352222 task_signals.go:204] [ 785: 789] Signal 785, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.821770 352222 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.821776 352222 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.821780 352222 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.821796 352222 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.823185 352222 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.823211 352222 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.823226 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.823244 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.823255 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.823414 352222 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.824209 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.825781 352222 syscalls.go:262] [ 790: 790] Allocating stack with size of 8388608 bytes D0713 08:45:59.825969 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.827102 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.827152 352222 usertrap_amd64.go:106] [ 790: 790] Map a usertrap vma at 64000 D0713 08:45:59.827233 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 1 D0713 08:45:59.827257 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:59.827796 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.827839 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 2 D0713 08:45:59.827855 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:59.828828 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.828860 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 3 D0713 08:45:59.828869 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:59.835585 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.835617 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 4 D0713 08:45:59.835628 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:59.836715 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.836741 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 5 D0713 08:45:59.836755 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:59.836843 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.836882 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 6 D0713 08:45:59.836901 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:59.837432 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.837459 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 7 D0713 08:45:59.837470 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:59.837654 352222 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.837665 352222 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc00118d0b0 8 D0713 08:45:59.837673 352222 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:59.837836 352222 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.837852 352222 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc00118d0b0 9 D0713 08:45:59.837862 352222 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:59.838003 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.838025 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 10 D0713 08:45:59.838034 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:59.845492 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.845534 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 11 D0713 08:45:59.845549 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:59.849318 352222 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.849340 352222 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc00118d0b0 12 D0713 08:45:59.849351 352222 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:59.849377 352222 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.849397 352222 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc00118d0b0 13 D0713 08:45:59.849406 352222 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:59.849458 352222 task_signals.go:470] [ 790: 790] Notified of signal 23 D0713 08:45:59.849517 352222 task_signals.go:220] [ 790: 790] Signal 23: delivering to handler D0713 08:45:59.855942 352222 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.855966 352222 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc00118d0b0 14 D0713 08:45:59.855976 352222 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:59.856044 352222 task_exit.go:204] [ 790: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.856064 352222 task_exit.go:204] [ 790: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.856086 352222 task_signals.go:204] [ 790: 791] Signal 790, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.856098 352222 task_exit.go:204] [ 790: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.856104 352222 task_exit.go:204] [ 790: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.856107 352222 task_exit.go:204] [ 790: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.856097 352222 task_signals.go:204] [ 790: 793] Signal 790, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.856134 352222 task_signals.go:204] [ 790: 794] Signal 790, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.856146 352222 task_exit.go:204] [ 790: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.856183 352222 task_exit.go:204] [ 790: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.856197 352222 task_exit.go:204] [ 790: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.856126 352222 task_signals.go:204] [ 790: 792] Signal 790, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.856231 352222 task_exit.go:204] [ 790: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.856237 352222 task_exit.go:204] [ 790: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.856243 352222 task_exit.go:204] [ 790: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.856253 352222 task_exit.go:204] [ 790: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.857818 352222 task_exit.go:204] [ 790: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.857851 352222 task_exit.go:204] [ 790: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.857869 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.857908 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.857933 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.858032 352222 task_exit.go:204] [ 790: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.858970 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.860457 352222 syscalls.go:262] [ 795: 795] Allocating stack with size of 8388608 bytes D0713 08:45:59.860628 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.861857 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.861907 352222 usertrap_amd64.go:106] [ 795: 795] Map a usertrap vma at 64000 D0713 08:45:59.861993 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 1 D0713 08:45:59.862024 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:59.862486 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.862516 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 2 D0713 08:45:59.862530 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:59.863304 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.863325 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 3 D0713 08:45:59.863335 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:59.869729 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.869751 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 4 D0713 08:45:59.869760 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:59.870778 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.870801 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 5 D0713 08:45:59.870811 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:59.870862 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.870867 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 6 D0713 08:45:59.870873 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:59.871083 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.871096 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 7 D0713 08:45:59.871102 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:59.871278 352222 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.871334 352222 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc00118d1a0 8 D0713 08:45:59.871359 352222 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:59.871539 352222 usertrap_amd64.go:212] [ 795: 797] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:59.871554 352222 usertrap_amd64.go:122] [ 795: 797] Allocate a new trap: 0xc00118d1a0 9 D0713 08:45:59.871561 352222 usertrap_amd64.go:225] [ 795: 797] Apply the binary patch addr 46b6e0 trap addr 642d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:59.871611 352222 usertrap_amd64.go:212] [ 795: 797] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.871636 352222 usertrap_amd64.go:122] [ 795: 797] Allocate a new trap: 0xc00118d1a0 10 D0713 08:45:59.871658 352222 usertrap_amd64.go:225] [ 795: 797] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:59.871722 352222 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.871740 352222 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc00118d1a0 11 D0713 08:45:59.871747 352222 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:59.878303 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.878325 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 12 D0713 08:45:59.878334 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:59.882027 352222 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.882051 352222 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc00118d1a0 13 D0713 08:45:59.882060 352222 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:59.882255 352222 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.882304 352222 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc00118d1a0 14 D0713 08:45:59.882322 352222 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:59.882369 352222 task_signals.go:470] [ 795: 795] Notified of signal 23 D0713 08:45:59.882468 352222 task_signals.go:220] [ 795: 795] Signal 23: delivering to handler D0713 08:45:59.887540 352222 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.887562 352222 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc00118d1a0 15 D0713 08:45:59.887574 352222 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:59.887639 352222 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.887659 352222 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.887683 352222 task_signals.go:204] [ 795: 798] Signal 795, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.887684 352222 task_signals.go:204] [ 795: 797] Signal 795, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.887699 352222 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.887722 352222 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.887744 352222 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.887803 352222 task_signals.go:204] [ 795: 799] Signal 795, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.887816 352222 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.887837 352222 task_signals.go:204] [ 795: 796] Signal 795, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.887862 352222 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.887877 352222 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.887899 352222 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.887908 352222 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.887913 352222 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.887925 352222 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.889093 352222 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.889114 352222 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.889123 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.889142 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.889157 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.889372 352222 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.889838 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.891391 352222 syscalls.go:262] [ 800: 800] Allocating stack with size of 8388608 bytes D0713 08:45:59.891469 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.892688 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.892756 352222 usertrap_amd64.go:106] [ 800: 800] Map a usertrap vma at 60000 D0713 08:45:59.893228 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 1 D0713 08:45:59.893262 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:59.893685 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.893701 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 2 D0713 08:45:59.893749 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:59.894495 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.894515 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 3 D0713 08:45:59.894523 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:59.900520 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.900547 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 4 D0713 08:45:59.900556 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:59.901680 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.901699 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 5 D0713 08:45:59.901712 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:59.901793 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.901813 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 6 D0713 08:45:59.901823 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:59.902315 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.902340 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 7 D0713 08:45:59.902351 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:59.902562 352222 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.902615 352222 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc002269200 8 D0713 08:45:59.902636 352222 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:59.902840 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.902868 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 9 D0713 08:45:59.902879 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:59.902965 352222 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.902982 352222 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc002269200 10 D0713 08:45:59.902991 352222 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:59.910136 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.910160 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 11 D0713 08:45:59.910170 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:59.914175 352222 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.914204 352222 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc002269200 12 D0713 08:45:59.914216 352222 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:59.914280 352222 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.914309 352222 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc002269200 13 D0713 08:45:59.914325 352222 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:59.914389 352222 task_signals.go:470] [ 800: 800] Notified of signal 23 D0713 08:45:59.914438 352222 task_signals.go:179] [ 800: 800] Restarting syscall 202: interrupted by signal 23 D0713 08:45:59.914457 352222 task_signals.go:220] [ 800: 800] Signal 23: delivering to handler D0713 08:45:59.919700 352222 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.919727 352222 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc002269200 14 D0713 08:45:59.919738 352222 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:59.919807 352222 task_exit.go:204] [ 800: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.919825 352222 task_exit.go:204] [ 800: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.919845 352222 task_signals.go:204] [ 800: 803] Signal 800, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.919862 352222 task_exit.go:204] [ 800: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.919867 352222 task_exit.go:204] [ 800: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.919870 352222 task_exit.go:204] [ 800: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.919856 352222 task_signals.go:204] [ 800: 802] Signal 800, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.919883 352222 task_signals.go:204] [ 800: 805] Signal 800, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.919890 352222 task_exit.go:204] [ 800: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.919913 352222 task_exit.go:204] [ 800: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.919925 352222 task_exit.go:204] [ 800: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.919934 352222 task_signals.go:204] [ 800: 801] Signal 800, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.919944 352222 task_exit.go:204] [ 800: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.919950 352222 task_exit.go:204] [ 800: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.919955 352222 task_exit.go:204] [ 800: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.919964 352222 task_exit.go:204] [ 800: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.919970 352222 task_exit.go:204] [ 800: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.919974 352222 task_exit.go:204] [ 800: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.919983 352222 task_signals.go:204] [ 800: 804] Signal 800, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.919995 352222 task_exit.go:204] [ 800: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.921329 352222 task_exit.go:204] [ 800: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.921349 352222 task_exit.go:204] [ 800: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.921357 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.921406 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.921412 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.921519 352222 task_exit.go:204] [ 800: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.922451 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.923884 352222 syscalls.go:262] [ 806: 806] Allocating stack with size of 8388608 bytes D0713 08:45:59.924085 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.925408 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.925445 352222 usertrap_amd64.go:106] [ 806: 806] Map a usertrap vma at 65000 D0713 08:45:59.925546 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 1 D0713 08:45:59.925583 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:59.925929 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.925948 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 2 D0713 08:45:59.925957 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:59.926613 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.926633 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 3 D0713 08:45:59.926641 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:59.932006 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.932031 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 4 D0713 08:45:59.932040 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:59.933460 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.933482 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 5 D0713 08:45:59.933491 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:59.933549 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.933558 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 6 D0713 08:45:59.933566 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:59.933745 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.933759 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 7 D0713 08:45:59.933765 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:59.933889 352222 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.933908 352222 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc00118d950 8 D0713 08:45:59.933915 352222 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:59.934088 352222 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.934132 352222 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc00118d950 9 D0713 08:45:59.934147 352222 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:59.934258 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.934272 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 10 D0713 08:45:59.934282 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:59.942164 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.942195 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 11 D0713 08:45:59.942206 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:59.944661 352222 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.944695 352222 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc00118d950 12 D0713 08:45:59.944706 352222 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:59.944814 352222 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.944829 352222 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc00118d950 13 D0713 08:45:59.944840 352222 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:59.944905 352222 task_signals.go:470] [ 806: 806] Notified of signal 23 D0713 08:45:59.945066 352222 task_signals.go:220] [ 806: 806] Signal 23: delivering to handler D0713 08:45:59.953263 352222 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.953290 352222 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc00118d950 14 D0713 08:45:59.953299 352222 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:59.953347 352222 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.953370 352222 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.953388 352222 task_signals.go:204] [ 806: 809] Signal 806, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.953398 352222 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.953404 352222 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.953415 352222 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.953425 352222 task_signals.go:204] [ 806: 808] Signal 806, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.953462 352222 task_signals.go:204] [ 806: 807] Signal 806, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.953474 352222 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.953482 352222 task_signals.go:204] [ 806: 810] Signal 806, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.953490 352222 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.953494 352222 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.953500 352222 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.953506 352222 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.953512 352222 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.953538 352222 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.954806 352222 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.954827 352222 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.954835 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.954930 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.954948 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.955002 352222 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.955564 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.957000 352222 syscalls.go:262] [ 811: 811] Allocating stack with size of 8388608 bytes D0713 08:45:59.957184 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.958481 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.958545 352222 usertrap_amd64.go:106] [ 811: 811] Map a usertrap vma at 6a000 D0713 08:45:59.958675 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 1 D0713 08:45:59.958721 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:59.959151 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.959178 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 2 D0713 08:45:59.959188 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:59.959873 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.959911 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 3 D0713 08:45:59.959925 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:59.965916 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:59.965941 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 4 D0713 08:45:59.965951 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:59.967219 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:59.967239 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 5 D0713 08:45:59.967246 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:59.967260 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b214:sysno 13 D0713 08:45:59.967264 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 6 D0713 08:45:59.967269 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:59.967624 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:59.967639 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 7 D0713 08:45:59.967644 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:59.967713 352222 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:59.967720 352222 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00243c720 8 D0713 08:45:59.967725 352222 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:59.967866 352222 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46af76:sysno 35 D0713 08:45:59.967889 352222 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00243c720 9 D0713 08:45:59.967897 352222 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:59.967980 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:59.967989 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 10 D0713 08:45:59.967999 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:59.975265 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46af29:sysno 293 D0713 08:45:59.975289 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 11 D0713 08:45:59.975298 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:59.979454 352222 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b020:sysno 39 D0713 08:45:59.979478 352222 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00243c720 12 D0713 08:45:59.979487 352222 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:59.979568 352222 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:59.979586 352222 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00243c720 13 D0713 08:45:59.979597 352222 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:59.979652 352222 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 08:45:59.979729 352222 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler D0713 08:45:59.985920 352222 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:59.985946 352222 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00243c720 14 D0713 08:45:59.985956 352222 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:59.986030 352222 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.986047 352222 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.986063 352222 task_signals.go:204] [ 811: 813] Signal 811, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.986085 352222 task_signals.go:204] [ 811: 812] Signal 811, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.986096 352222 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.986071 352222 task_signals.go:204] [ 811: 814] Signal 811, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.986109 352222 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.986126 352222 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.986121 352222 task_signals.go:204] [ 811: 815] Signal 811, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:59.986132 352222 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.986167 352222 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.986271 352222 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.986288 352222 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.986321 352222 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.986363 352222 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.986383 352222 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:59.987888 352222 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:59.987926 352222 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.987941 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:59.987979 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:59.988017 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:59.988037 352222 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:59.989019 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.990464 352222 syscalls.go:262] [ 816: 816] Allocating stack with size of 8388608 bytes D0713 08:45:59.990625 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:59.991973 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:59.992009 352222 usertrap_amd64.go:106] [ 816: 816] Map a usertrap vma at 61000 D0713 08:45:59.992079 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 1 D0713 08:45:59.992096 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:59.992536 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:59.992556 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 2 D0713 08:45:59.992563 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:59.993264 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:59.993288 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 3 D0713 08:45:59.993295 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:46:00.000153 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.000176 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 4 D0713 08:46:00.000185 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:46:00.001429 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.001463 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 5 D0713 08:46:00.001472 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:46:00.001525 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.001538 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 6 D0713 08:46:00.001544 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:46:00.001943 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.001961 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 7 D0713 08:46:00.001995 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:46:00.002209 352222 usertrap_amd64.go:212] [ 816: 817] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.002285 352222 usertrap_amd64.go:122] [ 816: 817] Allocate a new trap: 0xc0023d45d0 8 D0713 08:46:00.002308 352222 usertrap_amd64.go:225] [ 816: 817] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:46:00.002526 352222 usertrap_amd64.go:212] [ 816: 817] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.002554 352222 usertrap_amd64.go:122] [ 816: 817] Allocate a new trap: 0xc0023d45d0 9 D0713 08:46:00.002566 352222 usertrap_amd64.go:225] [ 816: 817] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:46:00.002582 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.002587 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 10 D0713 08:46:00.002594 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:46:00.010513 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.010556 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 11 D0713 08:46:00.010565 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:46:00.013087 352222 usertrap_amd64.go:212] [ 816: 817] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.013112 352222 usertrap_amd64.go:122] [ 816: 817] Allocate a new trap: 0xc0023d45d0 12 D0713 08:46:00.013123 352222 usertrap_amd64.go:225] [ 816: 817] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:46:00.013209 352222 usertrap_amd64.go:212] [ 816: 817] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.013244 352222 usertrap_amd64.go:122] [ 816: 817] Allocate a new trap: 0xc0023d45d0 13 D0713 08:46:00.013257 352222 usertrap_amd64.go:225] [ 816: 817] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:46:00.013330 352222 task_signals.go:470] [ 816: 816] Notified of signal 23 D0713 08:46:00.013459 352222 task_signals.go:220] [ 816: 816] Signal 23: delivering to handler I0713 08:46:00.021595 352222 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 08:46:00.021677 352222 usertrap_amd64.go:212] [ 816: 816] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.021686 352222 usertrap_amd64.go:122] [ 816: 816] Allocate a new trap: 0xc0023d45d0 14 D0713 08:46:00.021695 352222 usertrap_amd64.go:225] [ 816: 816] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:46:00.021781 352222 task_exit.go:204] [ 816: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.021803 352222 task_exit.go:204] [ 816: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.021823 352222 task_signals.go:204] [ 816: 819] Signal 816, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.021834 352222 task_exit.go:204] [ 816: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.021841 352222 task_exit.go:204] [ 816: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.021845 352222 task_exit.go:204] [ 816: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.021821 352222 task_signals.go:204] [ 816: 818] Signal 816, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.021868 352222 task_signals.go:204] [ 816: 817] Signal 816, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.021872 352222 task_exit.go:204] [ 816: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.021857 352222 task_signals.go:204] [ 816: 820] Signal 816, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.021889 352222 task_exit.go:204] [ 816: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.021894 352222 task_exit.go:204] [ 816: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.021904 352222 task_exit.go:204] [ 816: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.021920 352222 task_exit.go:204] [ 816: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.021924 352222 task_exit.go:204] [ 816: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.021930 352222 task_exit.go:204] [ 816: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.023336 352222 task_exit.go:204] [ 816: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.023363 352222 task_exit.go:204] [ 816: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.023378 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.023412 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.023428 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.023484 352222 task_exit.go:204] [ 816: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.024357 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.025531 352222 syscalls.go:262] [ 821: 821] Allocating stack with size of 8388608 bytes D0713 08:46:00.025629 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.026788 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.026871 352222 usertrap_amd64.go:106] [ 821: 821] Map a usertrap vma at 68000 D0713 08:46:00.027011 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 1 D0713 08:46:00.027067 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:00.027578 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.027611 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 2 D0713 08:46:00.027626 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:00.028519 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.028547 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 3 D0713 08:46:00.028559 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:00.033620 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.033654 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 4 D0713 08:46:00.033666 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:00.034929 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.034949 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 5 D0713 08:46:00.034956 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:00.034979 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.034983 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 6 D0713 08:46:00.034988 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:00.035441 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.035458 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 7 D0713 08:46:00.035465 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:00.035564 352222 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.035588 352222 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0022c91a0 8 D0713 08:46:00.035594 352222 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:00.035679 352222 usertrap_amd64.go:212] [ 821: 823] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.035692 352222 usertrap_amd64.go:122] [ 821: 823] Allocate a new trap: 0xc0022c91a0 9 D0713 08:46:00.035713 352222 usertrap_amd64.go:225] [ 821: 823] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:00.035890 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.035944 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 10 D0713 08:46:00.035963 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:00.048074 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.048121 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 11 D0713 08:46:00.048139 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:00.050848 352222 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.050893 352222 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0022c91a0 12 D0713 08:46:00.050909 352222 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:00.050935 352222 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.050955 352222 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0022c91a0 13 D0713 08:46:00.050966 352222 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:00.051047 352222 task_signals.go:470] [ 821: 821] Notified of signal 23 D0713 08:46:00.051125 352222 task_signals.go:220] [ 821: 821] Signal 23: delivering to handler I0713 08:46:00.058854 352222 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 08:46:00.058972 352222 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.058990 352222 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0022c91a0 14 D0713 08:46:00.059003 352222 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:00.059074 352222 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.059106 352222 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.059130 352222 task_signals.go:204] [ 821: 824] Signal 821, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.059156 352222 task_signals.go:204] [ 821: 825] Signal 821, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.059178 352222 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.059185 352222 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.059188 352222 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.059179 352222 task_signals.go:204] [ 821: 822] Signal 821, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.059234 352222 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.059192 352222 task_signals.go:204] [ 821: 823] Signal 821, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.059251 352222 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.059294 352222 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.059257 352222 task_signals.go:204] [ 821: 826] Signal 821, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.059337 352222 task_exit.go:204] [ 821: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.059346 352222 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.059359 352222 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.059365 352222 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.059379 352222 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.059410 352222 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.059421 352222 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.061014 352222 task_exit.go:204] [ 821: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.061132 352222 task_exit.go:204] [ 821: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.061170 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.061229 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.061245 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.061311 352222 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.062003 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.063407 352222 syscalls.go:262] [ 827: 827] Allocating stack with size of 8388608 bytes D0713 08:46:00.063540 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.064739 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.064783 352222 usertrap_amd64.go:106] [ 827: 827] Map a usertrap vma at 66000 D0713 08:46:00.064882 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 1 D0713 08:46:00.064916 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:00.065375 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.065400 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 2 D0713 08:46:00.065410 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:00.065947 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.065966 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 3 D0713 08:46:00.065972 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:00.071669 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.071691 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 4 D0713 08:46:00.071700 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:00.072717 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.072735 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 5 D0713 08:46:00.072742 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:00.072754 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.072758 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 6 D0713 08:46:00.072763 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:00.072961 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.072982 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 7 D0713 08:46:00.072990 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:00.073216 352222 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.073242 352222 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc002268150 8 D0713 08:46:00.073251 352222 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:00.073467 352222 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.073490 352222 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc002268150 9 D0713 08:46:00.073497 352222 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:00.073551 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.073572 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 10 D0713 08:46:00.073579 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:00.081494 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.081537 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 11 D0713 08:46:00.081552 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:00.083925 352222 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.083973 352222 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc002268150 12 D0713 08:46:00.083991 352222 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:00.084059 352222 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.084103 352222 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc002268150 13 D0713 08:46:00.084116 352222 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:00.084187 352222 task_signals.go:470] [ 827: 827] Notified of signal 23 D0713 08:46:00.084310 352222 task_signals.go:220] [ 827: 827] Signal 23: delivering to handler I0713 08:46:00.091526 352222 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 08:46:00.091633 352222 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.091651 352222 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc002268150 14 D0713 08:46:00.091660 352222 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:00.091721 352222 task_exit.go:204] [ 827: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.091736 352222 task_exit.go:204] [ 827: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.091760 352222 task_signals.go:204] [ 827: 830] Signal 827, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.091780 352222 task_exit.go:204] [ 827: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.091759 352222 task_signals.go:204] [ 827: 829] Signal 827, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.091786 352222 task_exit.go:204] [ 827: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.091803 352222 task_exit.go:204] [ 827: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.091833 352222 task_signals.go:204] [ 827: 831] Signal 827, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.091844 352222 task_exit.go:204] [ 827: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.091853 352222 task_signals.go:204] [ 827: 828] Signal 827, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.091871 352222 task_exit.go:204] [ 827: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.091883 352222 task_exit.go:204] [ 827: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.091892 352222 task_exit.go:204] [ 827: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.091900 352222 task_exit.go:204] [ 827: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.091930 352222 task_exit.go:204] [ 827: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.091936 352222 task_exit.go:204] [ 827: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.093276 352222 task_exit.go:204] [ 827: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.093323 352222 task_exit.go:204] [ 827: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.093332 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.093360 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.093368 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.093479 352222 task_exit.go:204] [ 827: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.094234 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.095554 352222 syscalls.go:262] [ 832: 832] Allocating stack with size of 8388608 bytes D0713 08:46:00.095643 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.097079 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.097116 352222 usertrap_amd64.go:106] [ 832: 832] Map a usertrap vma at 63000 D0713 08:46:00.097227 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 1 D0713 08:46:00.097241 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:00.097688 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.097710 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 2 D0713 08:46:00.097718 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:00.098452 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.098481 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 3 D0713 08:46:00.098489 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:00.105721 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.105760 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 4 D0713 08:46:00.105774 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:00.106956 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.106979 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 5 D0713 08:46:00.106986 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:00.107036 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.107054 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 6 D0713 08:46:00.107059 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:00.107268 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.107285 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 7 D0713 08:46:00.107291 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:00.107419 352222 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.107442 352222 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc000fac330 8 D0713 08:46:00.107451 352222 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:00.107740 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.107765 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 9 D0713 08:46:00.107774 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:00.107877 352222 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.107896 352222 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc000fac330 10 D0713 08:46:00.107904 352222 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:00.115592 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.115625 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 11 D0713 08:46:00.115637 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:00.119285 352222 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.119310 352222 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc000fac330 12 D0713 08:46:00.119320 352222 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:00.119334 352222 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.119339 352222 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc000fac330 13 D0713 08:46:00.119345 352222 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:00.119371 352222 task_signals.go:470] [ 832: 832] Notified of signal 23 D0713 08:46:00.119422 352222 task_signals.go:220] [ 832: 832] Signal 23: delivering to handler D0713 08:46:00.125874 352222 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.125904 352222 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc000fac330 14 D0713 08:46:00.125915 352222 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:00.125976 352222 task_exit.go:204] [ 832: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.125997 352222 task_exit.go:204] [ 832: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.126020 352222 task_signals.go:204] [ 832: 836] Signal 832, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.126031 352222 task_signals.go:204] [ 832: 833] Signal 832, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.126048 352222 task_exit.go:204] [ 832: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.126021 352222 task_signals.go:204] [ 832: 834] Signal 832, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.126044 352222 task_signals.go:204] [ 832: 835] Signal 832, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.126058 352222 task_exit.go:204] [ 832: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.126077 352222 task_exit.go:204] [ 832: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.126100 352222 task_exit.go:204] [ 832: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.126112 352222 task_exit.go:204] [ 832: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.126132 352222 task_exit.go:204] [ 832: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.126140 352222 task_exit.go:204] [ 832: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.126154 352222 task_exit.go:204] [ 832: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.126200 352222 task_exit.go:204] [ 832: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.126227 352222 task_exit.go:204] [ 832: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.127482 352222 task_exit.go:204] [ 832: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.127513 352222 task_exit.go:204] [ 832: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.127525 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.127557 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.127574 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.127623 352222 task_exit.go:204] [ 832: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.128280 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.129667 352222 syscalls.go:262] [ 837: 837] Allocating stack with size of 8388608 bytes D0713 08:46:00.129787 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.130966 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.130999 352222 usertrap_amd64.go:106] [ 837: 837] Map a usertrap vma at 68000 D0713 08:46:00.131062 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 1 D0713 08:46:00.131077 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:00.131328 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.131394 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 2 D0713 08:46:00.131405 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:00.131773 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.131790 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 3 D0713 08:46:00.131796 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:00.136896 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.136920 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 4 D0713 08:46:00.136929 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:00.138049 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.138077 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 5 D0713 08:46:00.138083 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:00.138132 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.138138 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 6 D0713 08:46:00.138142 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:00.138354 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.138370 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 7 D0713 08:46:00.138375 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:00.138449 352222 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.138462 352222 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc0023d4450 8 D0713 08:46:00.138468 352222 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:00.138664 352222 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.138696 352222 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc0023d4450 9 D0713 08:46:00.138712 352222 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:00.138729 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.138737 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 10 D0713 08:46:00.138747 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:00.146280 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.146307 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 11 D0713 08:46:00.146316 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:00.148928 352222 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.148984 352222 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc0023d4450 12 D0713 08:46:00.148995 352222 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:00.149026 352222 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.149031 352222 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc0023d4450 13 D0713 08:46:00.149037 352222 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:00.149057 352222 task_signals.go:470] [ 837: 837] Notified of signal 23 D0713 08:46:00.149106 352222 task_signals.go:220] [ 837: 837] Signal 23: delivering to handler I0713 08:46:00.156388 352222 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 08:46:00.156476 352222 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.156504 352222 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc0023d4450 14 D0713 08:46:00.156514 352222 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:00.156577 352222 task_exit.go:204] [ 837: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.156601 352222 task_exit.go:204] [ 837: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.156613 352222 task_signals.go:204] [ 837: 839] Signal 837, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.156639 352222 task_exit.go:204] [ 837: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.156637 352222 task_signals.go:204] [ 837: 841] Signal 837, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.156624 352222 task_signals.go:204] [ 837: 840] Signal 837, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.156652 352222 task_exit.go:204] [ 837: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.156685 352222 task_exit.go:204] [ 837: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.156712 352222 task_signals.go:204] [ 837: 838] Signal 837, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.156723 352222 task_exit.go:204] [ 837: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.156732 352222 task_exit.go:204] [ 837: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.156737 352222 task_exit.go:204] [ 837: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.156750 352222 task_exit.go:204] [ 837: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.156775 352222 task_exit.go:204] [ 837: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.156787 352222 task_exit.go:204] [ 837: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.156794 352222 task_exit.go:204] [ 837: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.158243 352222 task_exit.go:204] [ 837: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.158278 352222 task_exit.go:204] [ 837: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.158296 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.158328 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.158346 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.158429 352222 task_exit.go:204] [ 837: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.158983 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.160390 352222 syscalls.go:262] [ 842: 842] Allocating stack with size of 8388608 bytes D0713 08:46:00.160535 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.161913 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.161948 352222 usertrap_amd64.go:106] [ 842: 842] Map a usertrap vma at 6a000 D0713 08:46:00.162008 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 1 D0713 08:46:00.162026 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:00.162405 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.162429 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 2 D0713 08:46:00.162442 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:00.163103 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.163129 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 3 D0713 08:46:00.163138 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:00.169336 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.169379 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 4 D0713 08:46:00.169394 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:00.170463 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.170490 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 5 D0713 08:46:00.170504 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:00.170616 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.170633 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 6 D0713 08:46:00.170640 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:00.171087 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.171112 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 7 D0713 08:46:00.171127 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:00.171312 352222 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.171334 352222 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc0023d4720 8 D0713 08:46:00.171343 352222 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:00.171474 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.171501 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 9 D0713 08:46:00.171513 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:00.171540 352222 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.171556 352222 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc0023d4720 10 D0713 08:46:00.171565 352222 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:00.179149 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.179174 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 11 D0713 08:46:00.179186 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:00.182516 352222 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.182543 352222 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc0023d4720 12 D0713 08:46:00.182554 352222 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:00.182633 352222 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.182651 352222 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc0023d4720 13 D0713 08:46:00.182665 352222 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:00.182717 352222 task_signals.go:470] [ 842: 842] Notified of signal 23 D0713 08:46:00.182799 352222 task_signals.go:220] [ 842: 842] Signal 23: delivering to handler I0713 08:46:00.188054 352222 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 08:46:00.188132 352222 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.188142 352222 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc0023d4720 14 D0713 08:46:00.188151 352222 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:00.188222 352222 task_exit.go:204] [ 842: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.188234 352222 task_exit.go:204] [ 842: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.188259 352222 task_signals.go:204] [ 842: 845] Signal 842, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.188279 352222 task_exit.go:204] [ 842: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.188285 352222 task_exit.go:204] [ 842: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.188276 352222 task_signals.go:204] [ 842: 844] Signal 842, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.188290 352222 task_exit.go:204] [ 842: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.188326 352222 task_signals.go:204] [ 842: 846] Signal 842, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.188341 352222 task_exit.go:204] [ 842: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.188353 352222 task_signals.go:204] [ 842: 843] Signal 842, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.188379 352222 task_exit.go:204] [ 842: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.188396 352222 task_exit.go:204] [ 842: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.188427 352222 task_exit.go:204] [ 842: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.188472 352222 task_exit.go:204] [ 842: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.188491 352222 task_exit.go:204] [ 842: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.188502 352222 task_exit.go:204] [ 842: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.190068 352222 task_exit.go:204] [ 842: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.190095 352222 task_exit.go:204] [ 842: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.190140 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.190173 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.190197 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.190269 352222 task_exit.go:204] [ 842: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.190763 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.192022 352222 syscalls.go:262] [ 847: 847] Allocating stack with size of 8388608 bytes D0713 08:46:00.192118 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.193546 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.193582 352222 usertrap_amd64.go:106] [ 847: 847] Map a usertrap vma at 60000 D0713 08:46:00.193682 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 1 D0713 08:46:00.193698 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:00.194176 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.194223 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 2 D0713 08:46:00.194235 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:00.194872 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.194890 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 3 D0713 08:46:00.194898 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:00.201064 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.201094 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 4 D0713 08:46:00.201106 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:00.202328 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.202352 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 5 D0713 08:46:00.202363 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:00.202409 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.202422 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 6 D0713 08:46:00.202429 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:00.202601 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.202619 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 7 D0713 08:46:00.202628 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:00.202693 352222 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.202709 352222 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc000facb40 8 D0713 08:46:00.202719 352222 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:00.202925 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.202952 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 9 D0713 08:46:00.202962 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:00.202977 352222 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.203023 352222 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc000facb40 10 D0713 08:46:00.203030 352222 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:00.209845 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.209868 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 11 D0713 08:46:00.209877 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:00.213902 352222 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.213929 352222 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc000facb40 12 D0713 08:46:00.213939 352222 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:00.213993 352222 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.213998 352222 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc000facb40 13 D0713 08:46:00.214004 352222 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:00.214037 352222 task_signals.go:470] [ 847: 847] Notified of signal 23 D0713 08:46:00.214083 352222 task_signals.go:220] [ 847: 847] Signal 23: delivering to handler D0713 08:46:00.219848 352222 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.219874 352222 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc000facb40 14 D0713 08:46:00.219884 352222 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:00.219943 352222 task_exit.go:204] [ 847: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.219961 352222 task_exit.go:204] [ 847: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.219981 352222 task_signals.go:204] [ 847: 850] Signal 847, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.220001 352222 task_exit.go:204] [ 847: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.219995 352222 task_signals.go:204] [ 847: 849] Signal 847, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.220008 352222 task_exit.go:204] [ 847: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.220028 352222 task_exit.go:204] [ 847: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.220048 352222 task_signals.go:204] [ 847: 848] Signal 847, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.220073 352222 task_exit.go:204] [ 847: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.220085 352222 task_exit.go:204] [ 847: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.220098 352222 task_exit.go:204] [ 847: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.220085 352222 task_signals.go:204] [ 847: 851] Signal 847, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.220103 352222 task_exit.go:204] [ 847: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.220140 352222 task_exit.go:204] [ 847: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.220158 352222 task_exit.go:204] [ 847: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.220170 352222 task_exit.go:204] [ 847: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.221598 352222 task_exit.go:204] [ 847: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.221634 352222 task_exit.go:204] [ 847: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.221652 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.221686 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.221697 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.221748 352222 task_exit.go:204] [ 847: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.222304 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.223959 352222 syscalls.go:262] [ 852: 852] Allocating stack with size of 8388608 bytes D0713 08:46:00.224091 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.225508 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.225531 352222 usertrap_amd64.go:106] [ 852: 852] Map a usertrap vma at 67000 D0713 08:46:00.225632 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 1 D0713 08:46:00.225658 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:00.225996 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.226021 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 2 D0713 08:46:00.226032 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:00.226633 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.226660 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 3 D0713 08:46:00.226675 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:00.232382 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.232409 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 4 D0713 08:46:00.232419 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:00.233491 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.233519 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 5 D0713 08:46:00.233530 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:00.233604 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.233610 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 6 D0713 08:46:00.233615 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:00.234029 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.234045 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 7 D0713 08:46:00.234051 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:00.234186 352222 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.234214 352222 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc0023d4810 8 D0713 08:46:00.234230 352222 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:00.234458 352222 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.234486 352222 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc0023d4810 9 D0713 08:46:00.234499 352222 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:00.234878 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.234941 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 10 D0713 08:46:00.234956 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:00.242298 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.242322 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 11 D0713 08:46:00.242334 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:00.245202 352222 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.245240 352222 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc0023d4810 12 D0713 08:46:00.245255 352222 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:00.245271 352222 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.245277 352222 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc0023d4810 13 D0713 08:46:00.245285 352222 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:00.245348 352222 task_signals.go:470] [ 852: 852] Notified of signal 23 D0713 08:46:00.245442 352222 task_signals.go:220] [ 852: 852] Signal 23: delivering to handler I0713 08:46:00.252518 352222 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 08:46:00.252646 352222 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.252659 352222 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc0023d4810 14 D0713 08:46:00.252671 352222 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:00.252748 352222 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.252777 352222 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.252804 352222 task_signals.go:204] [ 852: 855] Signal 852, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.252823 352222 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.252808 352222 task_signals.go:204] [ 852: 854] Signal 852, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.252823 352222 task_signals.go:204] [ 852: 853] Signal 852, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.252830 352222 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.252882 352222 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.252926 352222 task_signals.go:204] [ 852: 856] Signal 852, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.252935 352222 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.252978 352222 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.252992 352222 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.253002 352222 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.253010 352222 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.253015 352222 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.253024 352222 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.254624 352222 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.254637 352222 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.254654 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.254703 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.254732 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.254808 352222 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.255483 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.256738 352222 syscalls.go:262] [ 857: 857] Allocating stack with size of 8388608 bytes D0713 08:46:00.256868 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.257835 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.257886 352222 usertrap_amd64.go:106] [ 857: 857] Map a usertrap vma at 68000 D0713 08:46:00.257953 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 1 D0713 08:46:00.257971 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:00.258264 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.258294 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 2 D0713 08:46:00.258308 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:00.259044 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.259068 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 3 D0713 08:46:00.259078 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:00.264733 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.264757 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 4 D0713 08:46:00.264767 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:00.265862 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.265884 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 5 D0713 08:46:00.265891 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:00.265942 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.265947 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 6 D0713 08:46:00.265960 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:00.266225 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.266230 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 7 D0713 08:46:00.266236 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:00.266346 352222 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.266377 352222 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc0023d4ab0 8 D0713 08:46:00.266387 352222 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:00.266620 352222 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.266656 352222 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc0023d4ab0 9 D0713 08:46:00.266682 352222 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:00.266711 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.266720 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 10 D0713 08:46:00.266727 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:00.273695 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.273718 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 11 D0713 08:46:00.273726 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:00.277727 352222 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.277761 352222 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc0023d4ab0 12 D0713 08:46:00.277776 352222 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:00.277887 352222 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.277913 352222 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc0023d4ab0 13 D0713 08:46:00.277942 352222 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:00.278020 352222 task_signals.go:470] [ 857: 857] Notified of signal 23 D0713 08:46:00.278095 352222 task_signals.go:179] [ 857: 857] Restarting syscall 202: interrupted by signal 23 D0713 08:46:00.278102 352222 task_signals.go:220] [ 857: 857] Signal 23: delivering to handler I0713 08:46:00.283881 352222 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 08:46:00.283977 352222 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.283992 352222 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc0023d4ab0 14 D0713 08:46:00.284005 352222 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:00.284075 352222 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.284111 352222 task_signals.go:204] [ 857: 858] Signal 857, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.284148 352222 task_signals.go:204] [ 857: 860] Signal 857, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.284152 352222 task_signals.go:204] [ 857: 859] Signal 857, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.284180 352222 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.284201 352222 task_signals.go:204] [ 857: 861] Signal 857, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.284211 352222 task_signals.go:204] [ 857: 862] Signal 857, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.284241 352222 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.284249 352222 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.284261 352222 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.284268 352222 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.284290 352222 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.284296 352222 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.284317 352222 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.284329 352222 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.284349 352222 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.284383 352222 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.284416 352222 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.284421 352222 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.284443 352222 task_exit.go:204] [ 857: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.286208 352222 task_exit.go:204] [ 857: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.286237 352222 task_exit.go:204] [ 857: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.286248 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.286278 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.286284 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.286433 352222 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.286999 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.288171 352222 syscalls.go:262] [ 863: 863] Allocating stack with size of 8388608 bytes D0713 08:46:00.288311 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.289634 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.289669 352222 usertrap_amd64.go:106] [ 863: 863] Map a usertrap vma at 60000 D0713 08:46:00.289760 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 1 D0713 08:46:00.289785 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:00.290226 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.290249 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 2 D0713 08:46:00.290258 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:00.291008 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.291030 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 3 D0713 08:46:00.291038 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:00.296290 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.296336 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 4 D0713 08:46:00.296351 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:00.297503 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.297523 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 5 D0713 08:46:00.297532 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:00.297641 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.297663 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 6 D0713 08:46:00.297674 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:00.298154 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.298182 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 7 D0713 08:46:00.298196 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:00.298368 352222 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.298404 352222 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc0022c8c00 8 D0713 08:46:00.298414 352222 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:00.298628 352222 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.298650 352222 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc0022c8c00 9 D0713 08:46:00.298686 352222 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:00.298825 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.298842 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 10 D0713 08:46:00.298849 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:00.305602 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.305618 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 11 D0713 08:46:00.305627 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:00.309073 352222 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.309116 352222 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc0022c8c00 12 D0713 08:46:00.309135 352222 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:00.309208 352222 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.309226 352222 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc0022c8c00 13 D0713 08:46:00.309243 352222 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:00.309319 352222 task_signals.go:470] [ 863: 863] Notified of signal 23 D0713 08:46:00.309420 352222 task_signals.go:220] [ 863: 863] Signal 23: delivering to handler D0713 08:46:00.315263 352222 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.315290 352222 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc0022c8c00 14 D0713 08:46:00.315300 352222 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:00.315356 352222 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.315376 352222 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.315397 352222 task_signals.go:204] [ 863: 864] Signal 863, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.315413 352222 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.315414 352222 task_signals.go:204] [ 863: 866] Signal 863, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.315434 352222 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.315454 352222 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.315481 352222 task_signals.go:204] [ 863: 867] Signal 863, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.315492 352222 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.315504 352222 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.315509 352222 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.315488 352222 task_signals.go:204] [ 863: 865] Signal 863, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.315518 352222 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.315527 352222 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.315532 352222 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.315555 352222 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.316904 352222 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.316930 352222 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.316960 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.317004 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.317023 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.317096 352222 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.317816 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.319747 352222 syscalls.go:262] [ 868: 868] Allocating stack with size of 8388608 bytes D0713 08:46:00.319881 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.320825 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.320867 352222 usertrap_amd64.go:106] [ 868: 868] Map a usertrap vma at 6a000 D0713 08:46:00.320955 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 1 D0713 08:46:00.320977 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:00.321256 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.321275 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 2 D0713 08:46:00.321282 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:00.321886 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.321909 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 3 D0713 08:46:00.321918 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:00.327794 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.327823 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 4 D0713 08:46:00.327834 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:00.328854 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.328875 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 5 D0713 08:46:00.328887 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:00.328933 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.328975 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 6 D0713 08:46:00.328984 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:00.329408 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.329432 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 7 D0713 08:46:00.329438 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:00.329556 352222 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.329570 352222 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc000fad1d0 8 D0713 08:46:00.329595 352222 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:00.329801 352222 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.329823 352222 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc000fad1d0 9 D0713 08:46:00.329831 352222 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:00.330004 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.330029 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 10 D0713 08:46:00.330038 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:00.337298 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.337357 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 11 D0713 08:46:00.337377 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:00.341479 352222 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.341508 352222 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc000fad1d0 12 D0713 08:46:00.341523 352222 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:00.341588 352222 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.341602 352222 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc000fad1d0 13 D0713 08:46:00.341608 352222 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:00.341627 352222 task_signals.go:470] [ 868: 868] Notified of signal 23 D0713 08:46:00.341669 352222 task_signals.go:220] [ 868: 868] Signal 23: delivering to handler D0713 08:46:00.348548 352222 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.348582 352222 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc000fad1d0 14 D0713 08:46:00.348602 352222 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:00.348683 352222 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.348713 352222 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.348735 352222 task_signals.go:204] [ 868: 870] Signal 868, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.348742 352222 task_signals.go:204] [ 868: 871] Signal 868, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.348765 352222 task_signals.go:204] [ 868: 872] Signal 868, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.348767 352222 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.348807 352222 task_signals.go:204] [ 868: 869] Signal 868, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.348823 352222 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.348834 352222 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.348849 352222 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.348856 352222 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.348861 352222 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.348872 352222 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.348879 352222 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.348901 352222 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.348911 352222 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.350152 352222 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.350194 352222 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.350208 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.350251 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.350261 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.350335 352222 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.351032 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.352574 352222 syscalls.go:262] [ 873: 873] Allocating stack with size of 8388608 bytes D0713 08:46:00.352732 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.353856 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.353894 352222 usertrap_amd64.go:106] [ 873: 873] Map a usertrap vma at 62000 D0713 08:46:00.353971 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 1 D0713 08:46:00.353992 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:46:00.354377 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.354392 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 2 D0713 08:46:00.354400 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:46:00.354981 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.355009 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 3 D0713 08:46:00.355019 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:46:00.360223 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.360254 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 4 D0713 08:46:00.360268 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:46:00.361301 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.361323 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 5 D0713 08:46:00.361331 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:46:00.361385 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.361397 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 6 D0713 08:46:00.361401 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:46:00.361827 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.361845 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 7 D0713 08:46:00.361850 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:46:00.361951 352222 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.361975 352222 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc0022693b0 8 D0713 08:46:00.361985 352222 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:46:00.362285 352222 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.362303 352222 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc0022693b0 9 D0713 08:46:00.362310 352222 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:46:00.362408 352222 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.362436 352222 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc0022693b0 10 D0713 08:46:00.362538 352222 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b020 trap addr 62320 ([184 39 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:46:00.362611 352222 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.362619 352222 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc0022693b0 11 D0713 08:46:00.362627 352222 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b04f trap addr 62370 ([184 234 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:46:00.362645 352222 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 08:46:00.362666 352222 usertrap_amd64.go:212] [ 873: 875] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:00.362664 352222 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 08:46:00.362683 352222 usertrap_amd64.go:122] [ 873: 875] Allocate a new trap: 0xc0022693b0 12 D0713 08:46:00.362696 352222 usertrap_amd64.go:225] [ 873: 875] Apply the binary patch addr 46b6e0 trap addr 623c0 ([184 24 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:46:00.362797 352222 usertrap_amd64.go:212] [ 873: 875] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.362829 352222 usertrap_amd64.go:122] [ 873: 875] Allocate a new trap: 0xc0022693b0 13 D0713 08:46:00.362840 352222 usertrap_amd64.go:225] [ 873: 875] Apply the binary patch addr 46b57c trap addr 62410 ([184 202 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:46:00.363493 352222 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 08:46:00.363558 352222 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 08:46:00.370122 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.370133 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 14 D0713 08:46:00.370143 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:46:00.373647 352222 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 08:46:00.373694 352222 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 08:46:00.379662 352222 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.379691 352222 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc0022693b0 15 D0713 08:46:00.379704 352222 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:46:00.379758 352222 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.379775 352222 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.379793 352222 task_signals.go:204] [ 873: 876] Signal 873, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.379812 352222 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.379812 352222 task_signals.go:204] [ 873: 877] Signal 873, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.379818 352222 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.379829 352222 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.379793 352222 task_signals.go:204] [ 873: 875] Signal 873, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.379844 352222 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.379871 352222 task_signals.go:204] [ 873: 874] Signal 873, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.379883 352222 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.379887 352222 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.379897 352222 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.379905 352222 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.379910 352222 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.379917 352222 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.380973 352222 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.380999 352222 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.381015 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.381033 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.381040 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.381118 352222 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.381264 352222 task_signals.go:470] [ 5: 12] Notified of signal 23 D0713 08:46:00.381291 352222 task_signals.go:220] [ 5: 12] Signal 23: delivering to handler D0713 08:46:00.381476 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.382716 352222 syscalls.go:262] [ 878: 878] Allocating stack with size of 8388608 bytes D0713 08:46:00.382802 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.384116 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.384147 352222 usertrap_amd64.go:106] [ 878: 878] Map a usertrap vma at 69000 D0713 08:46:00.384235 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 1 D0713 08:46:00.384284 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:46:00.384493 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.384513 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 2 D0713 08:46:00.384519 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:46:00.384768 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.384784 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 3 D0713 08:46:00.384790 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:46:00.389674 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.389699 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 4 D0713 08:46:00.389708 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:46:00.390694 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.390717 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 5 D0713 08:46:00.390726 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:46:00.390765 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.390779 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 6 D0713 08:46:00.390785 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:46:00.390991 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.391004 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 7 D0713 08:46:00.391010 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:46:00.391098 352222 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.391130 352222 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00243d5f0 8 D0713 08:46:00.391144 352222 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:46:00.391390 352222 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.391417 352222 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00243d5f0 9 D0713 08:46:00.391427 352222 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:46:00.391567 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.391616 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 10 D0713 08:46:00.391623 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:46:00.391632 352222 usertrap_amd64.go:212] [ 878: 881] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:00.391636 352222 usertrap_amd64.go:122] [ 878: 881] Allocate a new trap: 0xc00243d5f0 11 D0713 08:46:00.391671 352222 usertrap_amd64.go:225] [ 878: 881] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:46:00.397959 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.397971 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 12 D0713 08:46:00.397979 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:46:00.403137 352222 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.403162 352222 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00243d5f0 13 D0713 08:46:00.403171 352222 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:46:00.403237 352222 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.403257 352222 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00243d5f0 14 D0713 08:46:00.403267 352222 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:46:00.403319 352222 task_signals.go:470] [ 878: 878] Notified of signal 23 D0713 08:46:00.403391 352222 task_signals.go:220] [ 878: 878] Signal 23: delivering to handler D0713 08:46:00.406417 352222 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.406441 352222 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00243d5f0 15 D0713 08:46:00.406450 352222 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 08:46:00.406521 352222 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.406551 352222 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.406565 352222 task_signals.go:204] [ 878: 879] Signal 878, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.406568 352222 task_signals.go:204] [ 878: 882] Signal 878, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.406576 352222 task_signals.go:204] [ 878: 881] Signal 878, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.406583 352222 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.406605 352222 task_signals.go:204] [ 878: 880] Signal 878, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.406621 352222 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.406629 352222 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.406657 352222 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.406677 352222 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.406682 352222 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.406690 352222 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.406704 352222 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.406716 352222 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.406722 352222 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.407716 352222 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.407737 352222 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.407752 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.407775 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.407781 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.407836 352222 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.408291 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.409547 352222 syscalls.go:262] [ 883: 883] Allocating stack with size of 8388608 bytes D0713 08:46:00.409630 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.410867 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.410899 352222 usertrap_amd64.go:106] [ 883: 883] Map a usertrap vma at 61000 D0713 08:46:00.410991 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 1 D0713 08:46:00.411018 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:46:00.411270 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.411288 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 2 D0713 08:46:00.411295 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:46:00.411647 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.411664 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 3 D0713 08:46:00.411670 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:46:00.417299 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.417327 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 4 D0713 08:46:00.417337 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:46:00.418422 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.418450 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 5 D0713 08:46:00.418459 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:46:00.418539 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.418596 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 6 D0713 08:46:00.418617 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:46:00.419045 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.419067 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 7 D0713 08:46:00.419075 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:46:00.419241 352222 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.419267 352222 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc00243d650 8 D0713 08:46:00.419276 352222 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:46:00.419330 352222 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.419357 352222 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc00243d650 9 D0713 08:46:00.419371 352222 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:46:00.419416 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.419433 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 10 D0713 08:46:00.419439 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:46:00.419909 352222 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.419932 352222 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc00243d650 11 D0713 08:46:00.419939 352222 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:46:00.420012 352222 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.420037 352222 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc00243d650 12 D0713 08:46:00.420044 352222 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:46:00.420073 352222 task_signals.go:470] [ 883: 883] Notified of signal 23 D0713 08:46:00.420100 352222 task_signals.go:220] [ 883: 883] Signal 23: delivering to handler D0713 08:46:00.425839 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.425865 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 13 D0713 08:46:00.425873 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:46:00.430752 352222 task_signals.go:470] [ 883: 883] Notified of signal 23 D0713 08:46:00.431623 352222 task_signals.go:220] [ 883: 883] Signal 23: delivering to handler D0713 08:46:00.431741 352222 task_signals.go:470] [ 883: 883] Notified of signal 23 D0713 08:46:00.431786 352222 task_signals.go:220] [ 883: 883] Signal 23: delivering to handler D0713 08:46:00.435226 352222 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.435253 352222 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc00243d650 14 D0713 08:46:00.435263 352222 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:46:00.435314 352222 task_exit.go:204] [ 883: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.435338 352222 task_exit.go:204] [ 883: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.435341 352222 task_signals.go:204] [ 883: 884] Signal 883, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.435359 352222 task_signals.go:204] [ 883: 886] Signal 883, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.435368 352222 task_exit.go:204] [ 883: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.435377 352222 task_exit.go:204] [ 883: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.435384 352222 task_exit.go:204] [ 883: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.435378 352222 task_signals.go:204] [ 883: 887] Signal 883, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.435397 352222 task_exit.go:204] [ 883: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.435431 352222 task_signals.go:204] [ 883: 885] Signal 883, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.435455 352222 task_exit.go:204] [ 883: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.435468 352222 task_exit.go:204] [ 883: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.435476 352222 task_exit.go:204] [ 883: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.435482 352222 task_exit.go:204] [ 883: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.435516 352222 task_exit.go:204] [ 883: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.435529 352222 task_exit.go:204] [ 883: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.436587 352222 task_exit.go:204] [ 883: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.436610 352222 task_exit.go:204] [ 883: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.436620 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.436647 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.436669 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.436811 352222 task_exit.go:204] [ 883: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.437121 352222 task_signals.go:470] [ 5: 11] Notified of signal 23 D0713 08:46:00.437159 352222 task_signals.go:220] [ 5: 11] Signal 23: delivering to handler D0713 08:46:00.437507 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.439010 352222 syscalls.go:262] [ 888: 888] Allocating stack with size of 8388608 bytes D0713 08:46:00.439254 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.440390 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.440437 352222 usertrap_amd64.go:106] [ 888: 888] Map a usertrap vma at 66000 D0713 08:46:00.440577 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 1 D0713 08:46:00.440614 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:00.441189 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.441206 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 2 D0713 08:46:00.441216 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:00.441976 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.441996 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 3 D0713 08:46:00.442010 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:00.448541 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.448612 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 4 D0713 08:46:00.448630 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:00.449668 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.449692 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 5 D0713 08:46:00.449701 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:00.449759 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.449779 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 6 D0713 08:46:00.449784 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:00.450081 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.450095 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 7 D0713 08:46:00.450100 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:00.450265 352222 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.450297 352222 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc0001d8990 8 D0713 08:46:00.450310 352222 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:00.450455 352222 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.450474 352222 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc0001d8990 9 D0713 08:46:00.450483 352222 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:00.450561 352222 usertrap_amd64.go:212] [ 888: 891] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.450588 352222 usertrap_amd64.go:122] [ 888: 891] Allocate a new trap: 0xc0001d8990 10 D0713 08:46:00.450601 352222 usertrap_amd64.go:225] [ 888: 891] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:00.457104 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.457128 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 11 D0713 08:46:00.457137 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:00.459381 352222 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 08:46:00.459413 352222 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 08:46:00.461132 352222 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.461164 352222 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc0001d8990 12 D0713 08:46:00.461178 352222 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:00.461234 352222 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.461256 352222 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc0001d8990 13 D0713 08:46:00.461268 352222 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:00.461312 352222 task_signals.go:470] [ 888: 888] Notified of signal 23 D0713 08:46:00.461344 352222 task_signals.go:220] [ 888: 888] Signal 23: delivering to handler D0713 08:46:00.467192 352222 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.467214 352222 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc0001d8990 14 D0713 08:46:00.467223 352222 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:00.467269 352222 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.467282 352222 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.467297 352222 task_signals.go:204] [ 888: 889] Signal 888, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.467304 352222 task_signals.go:204] [ 888: 891] Signal 888, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.467316 352222 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.467331 352222 task_signals.go:204] [ 888: 890] Signal 888, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.467334 352222 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.467344 352222 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.467360 352222 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.467400 352222 task_signals.go:204] [ 888: 893] Signal 888, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.467435 352222 task_signals.go:204] [ 888: 892] Signal 888, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.467463 352222 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.467469 352222 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.467480 352222 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.467488 352222 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.467492 352222 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.467498 352222 task_exit.go:204] [ 888: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.467505 352222 task_exit.go:204] [ 888: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.467509 352222 task_exit.go:204] [ 888: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.467516 352222 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.468509 352222 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.468529 352222 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.468539 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.468596 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.468611 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.468693 352222 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.469513 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.470919 352222 syscalls.go:262] [ 894: 894] Allocating stack with size of 8388608 bytes D0713 08:46:00.471157 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.472272 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.472304 352222 usertrap_amd64.go:106] [ 894: 894] Map a usertrap vma at 61000 D0713 08:46:00.472743 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 1 D0713 08:46:00.472772 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:46:00.473223 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.473264 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 2 D0713 08:46:00.473290 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:46:00.473681 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.473699 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 3 D0713 08:46:00.473704 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:46:00.479486 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.479509 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 4 D0713 08:46:00.479517 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:46:00.480612 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.480629 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 5 D0713 08:46:00.480635 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:46:00.480647 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.480652 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 6 D0713 08:46:00.480657 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:46:00.480907 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.480921 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 7 D0713 08:46:00.480927 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:46:00.481062 352222 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.481084 352222 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc002269980 8 D0713 08:46:00.481093 352222 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:46:00.481482 352222 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.481505 352222 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc002269980 9 D0713 08:46:00.481516 352222 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:46:00.481534 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.481540 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 10 D0713 08:46:00.481549 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:46:00.488178 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.488201 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 11 D0713 08:46:00.488208 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:46:00.491641 352222 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.491658 352222 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc002269980 12 D0713 08:46:00.491668 352222 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:46:00.492006 352222 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.492054 352222 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc002269980 13 D0713 08:46:00.492075 352222 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:46:00.492136 352222 task_signals.go:470] [ 894: 894] Notified of signal 23 D0713 08:46:00.492218 352222 task_signals.go:220] [ 894: 894] Signal 23: delivering to handler D0713 08:46:00.497977 352222 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.498001 352222 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc002269980 14 D0713 08:46:00.498011 352222 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:46:00.498069 352222 task_exit.go:204] [ 894: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.498095 352222 task_exit.go:204] [ 894: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.498145 352222 task_signals.go:204] [ 894: 898] Signal 894, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.498147 352222 task_signals.go:204] [ 894: 895] Signal 894, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.498158 352222 task_signals.go:204] [ 894: 897] Signal 894, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.498164 352222 task_exit.go:204] [ 894: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.498185 352222 task_signals.go:204] [ 894: 896] Signal 894, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.498199 352222 task_exit.go:204] [ 894: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.498247 352222 task_exit.go:204] [ 894: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.498264 352222 task_exit.go:204] [ 894: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.498279 352222 task_exit.go:204] [ 894: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.498299 352222 task_exit.go:204] [ 894: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.498303 352222 task_exit.go:204] [ 894: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.498311 352222 task_exit.go:204] [ 894: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.498397 352222 task_exit.go:204] [ 894: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.498413 352222 task_exit.go:204] [ 894: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.499578 352222 task_exit.go:204] [ 894: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.499598 352222 task_exit.go:204] [ 894: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.499614 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.499636 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.499677 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.499723 352222 task_exit.go:204] [ 894: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.500049 352222 task_signals.go:470] [ 5: 12] Notified of signal 23 D0713 08:46:00.500086 352222 task_signals.go:220] [ 5: 12] Signal 23: delivering to handler D0713 08:46:00.500359 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.501721 352222 syscalls.go:262] [ 899: 899] Allocating stack with size of 8388608 bytes D0713 08:46:00.501983 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.503205 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.503259 352222 usertrap_amd64.go:106] [ 899: 899] Map a usertrap vma at 67000 D0713 08:46:00.503422 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 1 D0713 08:46:00.503465 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:00.503857 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.503883 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 2 D0713 08:46:00.503897 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:00.504512 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.504535 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 3 D0713 08:46:00.504545 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:00.509590 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.509618 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 4 D0713 08:46:00.509628 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:00.510690 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.510716 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 5 D0713 08:46:00.510726 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:00.510781 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.510787 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 6 D0713 08:46:00.510793 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:00.510964 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.510982 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 7 D0713 08:46:00.510988 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:00.511062 352222 usertrap_amd64.go:212] [ 899: 900] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.511083 352222 usertrap_amd64.go:122] [ 899: 900] Allocate a new trap: 0xc0001d8ba0 8 D0713 08:46:00.511118 352222 usertrap_amd64.go:225] [ 899: 900] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:00.511303 352222 usertrap_amd64.go:212] [ 899: 900] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:00.511325 352222 usertrap_amd64.go:122] [ 899: 900] Allocate a new trap: 0xc0001d8ba0 9 D0713 08:46:00.511333 352222 usertrap_amd64.go:225] [ 899: 900] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:00.511350 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.511373 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 10 D0713 08:46:00.511382 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:00.511451 352222 usertrap_amd64.go:212] [ 899: 900] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.511472 352222 usertrap_amd64.go:122] [ 899: 900] Allocate a new trap: 0xc0001d8ba0 11 D0713 08:46:00.511485 352222 usertrap_amd64.go:225] [ 899: 900] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:00.517365 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.517386 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 12 D0713 08:46:00.517394 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:00.523086 352222 usertrap_amd64.go:212] [ 899: 900] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.523111 352222 usertrap_amd64.go:122] [ 899: 900] Allocate a new trap: 0xc0001d8ba0 13 D0713 08:46:00.523120 352222 usertrap_amd64.go:225] [ 899: 900] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:00.523182 352222 usertrap_amd64.go:212] [ 899: 900] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.523202 352222 usertrap_amd64.go:122] [ 899: 900] Allocate a new trap: 0xc0001d8ba0 14 D0713 08:46:00.523212 352222 usertrap_amd64.go:225] [ 899: 900] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:00.523230 352222 task_signals.go:470] [ 899: 899] Notified of signal 23 D0713 08:46:00.523277 352222 task_signals.go:220] [ 899: 899] Signal 23: delivering to handler D0713 08:46:00.526429 352222 usertrap_amd64.go:212] [ 899: 899] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.526453 352222 usertrap_amd64.go:122] [ 899: 899] Allocate a new trap: 0xc0001d8ba0 15 D0713 08:46:00.526461 352222 usertrap_amd64.go:225] [ 899: 899] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:46:00.526516 352222 task_exit.go:204] [ 899: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.526545 352222 task_signals.go:204] [ 899: 901] Signal 899, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.526576 352222 task_signals.go:204] [ 899: 903] Signal 899, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.526579 352222 task_exit.go:204] [ 899: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.526596 352222 task_exit.go:204] [ 899: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.526616 352222 task_exit.go:204] [ 899: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.526622 352222 task_exit.go:204] [ 899: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.526595 352222 task_signals.go:204] [ 899: 900] Signal 899, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.526632 352222 task_exit.go:204] [ 899: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.526608 352222 task_signals.go:204] [ 899: 902] Signal 899, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.526639 352222 task_exit.go:204] [ 899: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.526686 352222 task_exit.go:204] [ 899: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.526721 352222 task_exit.go:204] [ 899: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.526759 352222 task_exit.go:204] [ 899: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.526771 352222 task_exit.go:204] [ 899: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.526783 352222 task_exit.go:204] [ 899: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.528200 352222 task_exit.go:204] [ 899: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.528242 352222 task_exit.go:204] [ 899: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.528262 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.528351 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.528415 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.528464 352222 task_exit.go:204] [ 899: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.529133 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.530482 352222 syscalls.go:262] [ 904: 904] Allocating stack with size of 8388608 bytes D0713 08:46:00.530620 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.531762 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.531796 352222 usertrap_amd64.go:106] [ 904: 904] Map a usertrap vma at 66000 D0713 08:46:00.531853 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 1 D0713 08:46:00.531885 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:00.532274 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.532299 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 2 D0713 08:46:00.532307 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:00.532748 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.532766 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 3 D0713 08:46:00.532773 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:00.538462 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.538491 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 4 D0713 08:46:00.538500 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:00.539534 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.539564 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 5 D0713 08:46:00.539574 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:00.539623 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.539643 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 6 D0713 08:46:00.539651 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:00.540221 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.540298 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 7 D0713 08:46:00.540317 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:00.540510 352222 usertrap_amd64.go:212] [ 904: 905] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.540528 352222 usertrap_amd64.go:122] [ 904: 905] Allocate a new trap: 0xc0022c9680 8 D0713 08:46:00.540536 352222 usertrap_amd64.go:225] [ 904: 905] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:00.540727 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.540751 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 9 D0713 08:46:00.540770 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:00.540781 352222 usertrap_amd64.go:212] [ 904: 905] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.540786 352222 usertrap_amd64.go:122] [ 904: 905] Allocate a new trap: 0xc0022c9680 10 D0713 08:46:00.540793 352222 usertrap_amd64.go:225] [ 904: 905] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:00.546959 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.547008 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 11 D0713 08:46:00.547024 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:00.550890 352222 usertrap_amd64.go:212] [ 904: 905] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.550924 352222 usertrap_amd64.go:122] [ 904: 905] Allocate a new trap: 0xc0022c9680 12 D0713 08:46:00.550937 352222 usertrap_amd64.go:225] [ 904: 905] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:00.551001 352222 usertrap_amd64.go:212] [ 904: 905] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.551011 352222 usertrap_amd64.go:122] [ 904: 905] Allocate a new trap: 0xc0022c9680 13 D0713 08:46:00.551025 352222 usertrap_amd64.go:225] [ 904: 905] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:00.551094 352222 task_signals.go:470] [ 904: 904] Notified of signal 23 D0713 08:46:00.551184 352222 task_signals.go:220] [ 904: 904] Signal 23: delivering to handler D0713 08:46:00.556774 352222 usertrap_amd64.go:212] [ 904: 904] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.556800 352222 usertrap_amd64.go:122] [ 904: 904] Allocate a new trap: 0xc0022c9680 14 D0713 08:46:00.556810 352222 usertrap_amd64.go:225] [ 904: 904] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:00.556863 352222 task_exit.go:204] [ 904: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.556875 352222 task_exit.go:204] [ 904: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.556892 352222 task_signals.go:204] [ 904: 907] Signal 904, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.556913 352222 task_exit.go:204] [ 904: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.556918 352222 task_exit.go:204] [ 904: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.556926 352222 task_exit.go:204] [ 904: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.556967 352222 task_signals.go:204] [ 904: 905] Signal 904, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.556970 352222 task_signals.go:204] [ 904: 908] Signal 904, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.556984 352222 task_exit.go:204] [ 904: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.556972 352222 task_signals.go:204] [ 904: 906] Signal 904, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.557004 352222 task_exit.go:204] [ 904: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.557042 352222 task_exit.go:204] [ 904: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.557071 352222 task_exit.go:204] [ 904: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.557106 352222 task_exit.go:204] [ 904: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.557112 352222 task_exit.go:204] [ 904: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.557129 352222 task_exit.go:204] [ 904: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.558357 352222 task_exit.go:204] [ 904: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.558385 352222 task_exit.go:204] [ 904: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.558398 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.558447 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.558462 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.558522 352222 task_exit.go:204] [ 904: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.559055 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.560235 352222 syscalls.go:262] [ 909: 909] Allocating stack with size of 8388608 bytes D0713 08:46:00.560399 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.561570 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.561608 352222 usertrap_amd64.go:106] [ 909: 909] Map a usertrap vma at 61000 D0713 08:46:00.561669 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 1 D0713 08:46:00.561692 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:46:00.561995 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.562017 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 2 D0713 08:46:00.562025 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:46:00.562432 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.562446 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 3 D0713 08:46:00.562454 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:46:00.567463 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.567493 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 4 D0713 08:46:00.567504 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:46:00.568562 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.568580 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 5 D0713 08:46:00.568588 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:46:00.568599 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.568603 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 6 D0713 08:46:00.568609 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:46:00.568746 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.568760 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 7 D0713 08:46:00.568766 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:46:00.568837 352222 usertrap_amd64.go:212] [ 909: 910] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.568844 352222 usertrap_amd64.go:122] [ 909: 910] Allocate a new trap: 0xc000c262d0 8 D0713 08:46:00.568850 352222 usertrap_amd64.go:225] [ 909: 910] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:46:00.568979 352222 usertrap_amd64.go:212] [ 909: 910] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.569006 352222 usertrap_amd64.go:122] [ 909: 910] Allocate a new trap: 0xc000c262d0 9 D0713 08:46:00.569015 352222 usertrap_amd64.go:225] [ 909: 910] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:46:00.569024 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.569028 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 10 D0713 08:46:00.569033 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:46:00.569387 352222 usertrap_amd64.go:212] [ 909: 910] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.569415 352222 usertrap_amd64.go:122] [ 909: 910] Allocate a new trap: 0xc000c262d0 11 D0713 08:46:00.569426 352222 usertrap_amd64.go:225] [ 909: 910] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:46:00.569485 352222 usertrap_amd64.go:212] [ 909: 910] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.569501 352222 usertrap_amd64.go:122] [ 909: 910] Allocate a new trap: 0xc000c262d0 12 D0713 08:46:00.569515 352222 usertrap_amd64.go:225] [ 909: 910] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:46:00.569537 352222 task_signals.go:470] [ 909: 912] Notified of signal 23 D0713 08:46:00.569559 352222 task_signals.go:220] [ 909: 912] Signal 23: delivering to handler D0713 08:46:00.569761 352222 task_signals.go:470] [ 909: 909] Notified of signal 23 D0713 08:46:00.569833 352222 task_signals.go:220] [ 909: 909] Signal 23: delivering to handler D0713 08:46:00.575449 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.575474 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 13 D0713 08:46:00.575486 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:46:00.580498 352222 task_signals.go:470] [ 909: 909] Notified of signal 23 D0713 08:46:00.580862 352222 task_signals.go:220] [ 909: 909] Signal 23: delivering to handler D0713 08:46:00.584155 352222 usertrap_amd64.go:212] [ 909: 909] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.584181 352222 usertrap_amd64.go:122] [ 909: 909] Allocate a new trap: 0xc000c262d0 14 D0713 08:46:00.584193 352222 usertrap_amd64.go:225] [ 909: 909] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:46:00.584249 352222 task_exit.go:204] [ 909: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.584285 352222 task_exit.go:204] [ 909: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.584308 352222 task_signals.go:204] [ 909: 913] Signal 909, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.584314 352222 task_signals.go:204] [ 909: 912] Signal 909, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.584319 352222 task_exit.go:204] [ 909: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.584305 352222 task_signals.go:204] [ 909: 910] Signal 909, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.584335 352222 task_exit.go:204] [ 909: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.584363 352222 task_exit.go:204] [ 909: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.584404 352222 task_signals.go:204] [ 909: 911] Signal 909, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.584413 352222 task_exit.go:204] [ 909: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.584428 352222 task_exit.go:204] [ 909: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.584452 352222 task_exit.go:204] [ 909: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.584464 352222 task_exit.go:204] [ 909: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.584471 352222 task_exit.go:204] [ 909: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.584486 352222 task_exit.go:204] [ 909: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.584494 352222 task_exit.go:204] [ 909: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.585627 352222 task_exit.go:204] [ 909: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.585682 352222 task_exit.go:204] [ 909: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.585692 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.585716 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.585722 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.585770 352222 task_exit.go:204] [ 909: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.586136 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.587618 352222 syscalls.go:262] [ 914: 914] Allocating stack with size of 8388608 bytes D0713 08:46:00.587794 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.589358 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.589406 352222 usertrap_amd64.go:106] [ 914: 914] Map a usertrap vma at 67000 D0713 08:46:00.589480 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 1 D0713 08:46:00.589502 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:00.589862 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.589896 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 2 D0713 08:46:00.589907 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:00.590557 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.590584 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 3 D0713 08:46:00.590598 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:00.595449 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.595507 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 4 D0713 08:46:00.595527 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:00.596567 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.596591 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 5 D0713 08:46:00.596601 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:00.596670 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.596676 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 6 D0713 08:46:00.596683 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:00.597323 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.597398 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 7 D0713 08:46:00.597423 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:00.597753 352222 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.597788 352222 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc000c263c0 8 D0713 08:46:00.597804 352222 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:00.598121 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.598165 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 9 D0713 08:46:00.598188 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:00.598225 352222 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.598243 352222 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc000c263c0 10 D0713 08:46:00.598251 352222 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:00.605765 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.605829 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 11 D0713 08:46:00.605851 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:00.609363 352222 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.609403 352222 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc000c263c0 12 D0713 08:46:00.609423 352222 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:00.609482 352222 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.609530 352222 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc000c263c0 13 D0713 08:46:00.609549 352222 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:00.609593 352222 task_signals.go:470] [ 914: 914] Notified of signal 23 D0713 08:46:00.609715 352222 task_signals.go:220] [ 914: 914] Signal 23: delivering to handler D0713 08:46:00.616616 352222 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.616687 352222 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc000c263c0 14 D0713 08:46:00.616714 352222 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:00.616841 352222 task_exit.go:204] [ 914: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.616880 352222 task_exit.go:204] [ 914: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.616883 352222 task_signals.go:204] [ 914: 916] Signal 914, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.616925 352222 task_exit.go:204] [ 914: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.616966 352222 task_exit.go:204] [ 914: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.616928 352222 task_signals.go:204] [ 914: 915] Signal 914, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.616928 352222 task_signals.go:204] [ 914: 918] Signal 914, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.616974 352222 task_exit.go:204] [ 914: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.616923 352222 task_signals.go:204] [ 914: 917] Signal 914, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.617002 352222 task_exit.go:204] [ 914: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.617023 352222 task_exit.go:204] [ 914: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.617055 352222 task_exit.go:204] [ 914: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.617060 352222 task_exit.go:204] [ 914: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.617080 352222 task_exit.go:204] [ 914: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.617085 352222 task_exit.go:204] [ 914: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.617096 352222 task_exit.go:204] [ 914: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.618274 352222 task_exit.go:204] [ 914: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.618317 352222 task_exit.go:204] [ 914: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.618333 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.618373 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.618398 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.618491 352222 task_exit.go:204] [ 914: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.618650 352222 task_signals.go:470] [ 5: 12] Notified of signal 23 D0713 08:46:00.618788 352222 task_signals.go:220] [ 5: 12] Signal 23: delivering to handler D0713 08:46:00.619402 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.621125 352222 syscalls.go:262] [ 919: 919] Allocating stack with size of 8388608 bytes D0713 08:46:00.621340 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.622857 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.622910 352222 usertrap_amd64.go:106] [ 919: 919] Map a usertrap vma at 68000 D0713 08:46:00.622999 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 1 D0713 08:46:00.623038 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:00.623562 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.623598 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 2 D0713 08:46:00.623612 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:00.624391 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.624413 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 3 D0713 08:46:00.624421 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:00.630501 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.630543 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 4 D0713 08:46:00.630558 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:00.631742 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.631772 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 5 D0713 08:46:00.631784 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:00.631849 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.631865 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 6 D0713 08:46:00.631874 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:00.632087 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.632107 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 7 D0713 08:46:00.632115 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:00.632385 352222 usertrap_amd64.go:212] [ 919: 920] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.632402 352222 usertrap_amd64.go:122] [ 919: 920] Allocate a new trap: 0xc00097a810 8 D0713 08:46:00.632409 352222 usertrap_amd64.go:225] [ 919: 920] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:00.632694 352222 usertrap_amd64.go:212] [ 919: 920] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.632730 352222 usertrap_amd64.go:122] [ 919: 920] Allocate a new trap: 0xc00097a810 9 D0713 08:46:00.632743 352222 usertrap_amd64.go:225] [ 919: 920] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:00.632759 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.632765 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 10 D0713 08:46:00.632778 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:00.632926 352222 usertrap_amd64.go:212] [ 919: 922] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:00.632982 352222 usertrap_amd64.go:122] [ 919: 922] Allocate a new trap: 0xc00097a810 11 D0713 08:46:00.632994 352222 usertrap_amd64.go:225] [ 919: 922] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:00.640905 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.640935 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 12 D0713 08:46:00.640963 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:00.643622 352222 usertrap_amd64.go:212] [ 919: 920] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.643679 352222 usertrap_amd64.go:122] [ 919: 920] Allocate a new trap: 0xc00097a810 13 D0713 08:46:00.643694 352222 usertrap_amd64.go:225] [ 919: 920] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:00.643778 352222 usertrap_amd64.go:212] [ 919: 920] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.643802 352222 usertrap_amd64.go:122] [ 919: 920] Allocate a new trap: 0xc00097a810 14 D0713 08:46:00.643811 352222 usertrap_amd64.go:225] [ 919: 920] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:00.643866 352222 task_signals.go:470] [ 919: 919] Notified of signal 23 D0713 08:46:00.643937 352222 task_signals.go:220] [ 919: 919] Signal 23: delivering to handler D0713 08:46:00.652019 352222 usertrap_amd64.go:212] [ 919: 919] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.652050 352222 usertrap_amd64.go:122] [ 919: 919] Allocate a new trap: 0xc00097a810 15 D0713 08:46:00.652061 352222 usertrap_amd64.go:225] [ 919: 919] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 08:46:00.652163 352222 task_exit.go:204] [ 919: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.652187 352222 task_exit.go:204] [ 919: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.652216 352222 task_signals.go:204] [ 919: 922] Signal 919, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.652246 352222 task_exit.go:204] [ 919: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.652248 352222 task_signals.go:204] [ 919: 920] Signal 919, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.652256 352222 task_exit.go:204] [ 919: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.652299 352222 task_exit.go:204] [ 919: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.652215 352222 task_signals.go:204] [ 919: 921] Signal 919, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.652342 352222 task_signals.go:204] [ 919: 923] Signal 919, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.652363 352222 task_exit.go:204] [ 919: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.652402 352222 task_signals.go:204] [ 919: 924] Signal 919, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.652442 352222 task_exit.go:204] [ 919: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.652449 352222 task_exit.go:204] [ 919: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.652460 352222 task_exit.go:204] [ 919: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.652467 352222 task_exit.go:204] [ 919: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.652472 352222 task_exit.go:204] [ 919: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.652481 352222 task_exit.go:204] [ 919: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.652488 352222 task_exit.go:204] [ 919: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.652493 352222 task_exit.go:204] [ 919: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.652502 352222 task_exit.go:204] [ 919: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.653772 352222 task_exit.go:204] [ 919: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.653811 352222 task_exit.go:204] [ 919: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.653828 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.653866 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.653883 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.653973 352222 task_exit.go:204] [ 919: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.654736 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.656776 352222 syscalls.go:262] [ 925: 925] Allocating stack with size of 8388608 bytes D0713 08:46:00.656985 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.658364 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.658406 352222 usertrap_amd64.go:106] [ 925: 925] Map a usertrap vma at 63000 D0713 08:46:00.658494 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 1 D0713 08:46:00.658531 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:00.658936 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.658957 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 2 D0713 08:46:00.658966 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:00.659623 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.659643 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 3 D0713 08:46:00.659650 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:00.665765 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.665817 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 4 D0713 08:46:00.665835 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:00.667095 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.667169 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 5 D0713 08:46:00.667196 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:00.667275 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.667296 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 6 D0713 08:46:00.667304 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:00.667894 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.667913 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 7 D0713 08:46:00.667920 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:00.668203 352222 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.668229 352222 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc00097aae0 8 D0713 08:46:00.668238 352222 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:00.668419 352222 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.668452 352222 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc00097aae0 9 D0713 08:46:00.668465 352222 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:00.668499 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.668520 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 10 D0713 08:46:00.668574 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:00.669165 352222 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.669190 352222 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc00097aae0 11 D0713 08:46:00.669201 352222 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:00.669250 352222 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.669262 352222 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc00097aae0 12 D0713 08:46:00.669270 352222 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:00.669283 352222 task_signals.go:470] [ 925: 925] Notified of signal 23 D0713 08:46:00.669398 352222 task_signals.go:220] [ 925: 925] Signal 23: delivering to handler D0713 08:46:00.675546 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.675571 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 13 D0713 08:46:00.675579 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:00.679667 352222 task_signals.go:470] [ 925: 925] Notified of signal 23 D0713 08:46:00.679721 352222 task_signals.go:220] [ 925: 925] Signal 23: delivering to handler D0713 08:46:00.685688 352222 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.685717 352222 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc00097aae0 14 D0713 08:46:00.685727 352222 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:00.685797 352222 task_exit.go:204] [ 925: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.685820 352222 task_exit.go:204] [ 925: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.685851 352222 task_signals.go:204] [ 925: 929] Signal 925, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.685880 352222 task_exit.go:204] [ 925: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.685891 352222 task_signals.go:204] [ 925: 927] Signal 925, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.685902 352222 task_signals.go:204] [ 925: 928] Signal 925, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.685937 352222 task_signals.go:204] [ 925: 926] Signal 925, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.685947 352222 task_exit.go:204] [ 925: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.685954 352222 task_exit.go:204] [ 925: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.685965 352222 task_exit.go:204] [ 925: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.685994 352222 task_exit.go:204] [ 925: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.686000 352222 task_exit.go:204] [ 925: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.686007 352222 task_exit.go:204] [ 925: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.686014 352222 task_exit.go:204] [ 925: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.686017 352222 task_exit.go:204] [ 925: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.686024 352222 task_exit.go:204] [ 925: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.687188 352222 task_exit.go:204] [ 925: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.687216 352222 task_exit.go:204] [ 925: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.687227 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.687253 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.687260 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.687325 352222 task_exit.go:204] [ 925: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.687804 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.689172 352222 syscalls.go:262] [ 930: 930] Allocating stack with size of 8388608 bytes D0713 08:46:00.689293 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.690284 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.690320 352222 usertrap_amd64.go:106] [ 930: 930] Map a usertrap vma at 67000 D0713 08:46:00.690384 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 1 D0713 08:46:00.690400 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:00.690628 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.690647 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 2 D0713 08:46:00.690658 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:00.690973 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.690991 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 3 D0713 08:46:00.690997 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:00.696258 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.696305 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 4 D0713 08:46:00.696323 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:00.697466 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.697511 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 5 D0713 08:46:00.697528 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:00.697590 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.697597 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 6 D0713 08:46:00.697605 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:00.698009 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.698024 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 7 D0713 08:46:00.698031 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:00.698209 352222 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.698237 352222 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc0015851d0 8 D0713 08:46:00.698247 352222 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:00.698423 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.698440 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 9 D0713 08:46:00.698448 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:00.698462 352222 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.698468 352222 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc0015851d0 10 D0713 08:46:00.698476 352222 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:00.705339 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.705363 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 11 D0713 08:46:00.705373 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:00.708815 352222 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.708843 352222 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc0015851d0 12 D0713 08:46:00.708853 352222 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:00.708871 352222 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.708884 352222 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc0015851d0 13 D0713 08:46:00.708956 352222 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:00.708988 352222 task_signals.go:470] [ 930: 930] Notified of signal 23 D0713 08:46:00.709072 352222 task_signals.go:220] [ 930: 930] Signal 23: delivering to handler D0713 08:46:00.715986 352222 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.716015 352222 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc0015851d0 14 D0713 08:46:00.716026 352222 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:00.716099 352222 task_exit.go:204] [ 930: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.716124 352222 task_exit.go:204] [ 930: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.716154 352222 task_signals.go:204] [ 930: 934] Signal 930, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.716153 352222 task_signals.go:204] [ 930: 932] Signal 930, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.716176 352222 task_exit.go:204] [ 930: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.716208 352222 task_exit.go:204] [ 930: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.716236 352222 task_exit.go:204] [ 930: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.716262 352222 task_signals.go:204] [ 930: 931] Signal 930, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.716278 352222 task_exit.go:204] [ 930: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.716283 352222 task_exit.go:204] [ 930: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.716290 352222 task_exit.go:204] [ 930: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.716303 352222 task_signals.go:204] [ 930: 933] Signal 930, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.716321 352222 task_exit.go:204] [ 930: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.716326 352222 task_exit.go:204] [ 930: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.716329 352222 task_exit.go:204] [ 930: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.716339 352222 task_exit.go:204] [ 930: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.717724 352222 task_exit.go:204] [ 930: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.717753 352222 task_exit.go:204] [ 930: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.717763 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.717787 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.717793 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.717995 352222 task_exit.go:204] [ 930: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.718766 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.720307 352222 syscalls.go:262] [ 935: 935] Allocating stack with size of 8388608 bytes D0713 08:46:00.720435 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.721779 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.721816 352222 usertrap_amd64.go:106] [ 935: 935] Map a usertrap vma at 66000 D0713 08:46:00.721914 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 1 D0713 08:46:00.721937 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:00.722388 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.722410 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 2 D0713 08:46:00.722419 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:00.723294 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.723309 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 3 D0713 08:46:00.723315 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:00.729737 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.729775 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 4 D0713 08:46:00.729797 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:00.730896 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.730914 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 5 D0713 08:46:00.730924 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:00.730978 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.730993 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 6 D0713 08:46:00.730999 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:00.731338 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.731354 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 7 D0713 08:46:00.731361 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:00.731508 352222 usertrap_amd64.go:212] [ 935: 936] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.731525 352222 usertrap_amd64.go:122] [ 935: 936] Allocate a new trap: 0xc001585320 8 D0713 08:46:00.731531 352222 usertrap_amd64.go:225] [ 935: 936] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:00.731828 352222 usertrap_amd64.go:212] [ 935: 936] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.731867 352222 usertrap_amd64.go:122] [ 935: 936] Allocate a new trap: 0xc001585320 9 D0713 08:46:00.731878 352222 usertrap_amd64.go:225] [ 935: 936] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:00.731889 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.731894 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 10 D0713 08:46:00.731899 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:00.740358 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.740384 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 11 D0713 08:46:00.740393 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:00.742599 352222 usertrap_amd64.go:212] [ 935: 936] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.742628 352222 usertrap_amd64.go:122] [ 935: 936] Allocate a new trap: 0xc001585320 12 D0713 08:46:00.742639 352222 usertrap_amd64.go:225] [ 935: 936] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:00.742702 352222 usertrap_amd64.go:212] [ 935: 936] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.742715 352222 usertrap_amd64.go:122] [ 935: 936] Allocate a new trap: 0xc001585320 13 D0713 08:46:00.742723 352222 usertrap_amd64.go:225] [ 935: 936] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:00.742796 352222 task_signals.go:470] [ 935: 935] Notified of signal 23 D0713 08:46:00.742962 352222 task_signals.go:220] [ 935: 935] Signal 23: delivering to handler D0713 08:46:00.750735 352222 usertrap_amd64.go:212] [ 935: 935] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.750760 352222 usertrap_amd64.go:122] [ 935: 935] Allocate a new trap: 0xc001585320 14 D0713 08:46:00.750768 352222 usertrap_amd64.go:225] [ 935: 935] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:00.750830 352222 task_exit.go:204] [ 935: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.750843 352222 task_exit.go:204] [ 935: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.750863 352222 task_signals.go:204] [ 935: 938] Signal 935, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.750880 352222 task_exit.go:204] [ 935: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.750885 352222 task_exit.go:204] [ 935: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.750889 352222 task_exit.go:204] [ 935: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.750884 352222 task_signals.go:204] [ 935: 937] Signal 935, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.750908 352222 task_signals.go:204] [ 935: 936] Signal 935, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.750925 352222 task_exit.go:204] [ 935: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.750957 352222 task_exit.go:204] [ 935: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.750963 352222 task_exit.go:204] [ 935: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.750906 352222 task_signals.go:204] [ 935: 939] Signal 935, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.751002 352222 task_exit.go:204] [ 935: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.751039 352222 task_exit.go:204] [ 935: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.751053 352222 task_exit.go:204] [ 935: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.751066 352222 task_exit.go:204] [ 935: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.752668 352222 task_exit.go:204] [ 935: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.752690 352222 task_exit.go:204] [ 935: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.752700 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.752730 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.752748 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.752896 352222 task_exit.go:204] [ 935: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.753559 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.754978 352222 syscalls.go:262] [ 940: 940] Allocating stack with size of 8388608 bytes D0713 08:46:00.755100 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.756867 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.756903 352222 usertrap_amd64.go:106] [ 940: 940] Map a usertrap vma at 64000 D0713 08:46:00.757036 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 1 D0713 08:46:00.757065 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:00.757500 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.757520 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 2 D0713 08:46:00.757528 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:00.758233 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.758252 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 3 D0713 08:46:00.758259 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:00.763841 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.763864 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 4 D0713 08:46:00.763871 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:00.764968 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.765016 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 5 D0713 08:46:00.765027 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:00.765184 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.765192 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 6 D0713 08:46:00.765198 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:00.765645 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.765663 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 7 D0713 08:46:00.765669 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:00.765790 352222 usertrap_amd64.go:212] [ 940: 941] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.765817 352222 usertrap_amd64.go:122] [ 940: 941] Allocate a new trap: 0xc00097b110 8 D0713 08:46:00.765823 352222 usertrap_amd64.go:225] [ 940: 941] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:00.766023 352222 usertrap_amd64.go:212] [ 940: 941] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.766058 352222 usertrap_amd64.go:122] [ 940: 941] Allocate a new trap: 0xc00097b110 9 D0713 08:46:00.766076 352222 usertrap_amd64.go:225] [ 940: 941] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:00.766123 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.766145 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 10 D0713 08:46:00.766157 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:00.773334 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.773357 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 11 D0713 08:46:00.773366 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:00.776361 352222 usertrap_amd64.go:212] [ 940: 941] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.776390 352222 usertrap_amd64.go:122] [ 940: 941] Allocate a new trap: 0xc00097b110 12 D0713 08:46:00.776411 352222 usertrap_amd64.go:225] [ 940: 941] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:00.776529 352222 usertrap_amd64.go:212] [ 940: 941] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.776606 352222 usertrap_amd64.go:122] [ 940: 941] Allocate a new trap: 0xc00097b110 13 D0713 08:46:00.776630 352222 usertrap_amd64.go:225] [ 940: 941] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:00.776712 352222 task_signals.go:470] [ 940: 940] Notified of signal 23 D0713 08:46:00.776840 352222 task_signals.go:220] [ 940: 940] Signal 23: delivering to handler executing program I0713 08:46:00.785124 352222 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 08:46:00.785223 352222 usertrap_amd64.go:212] [ 940: 940] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.785247 352222 usertrap_amd64.go:122] [ 940: 940] Allocate a new trap: 0xc00097b110 14 D0713 08:46:00.785269 352222 usertrap_amd64.go:225] [ 940: 940] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:00.785347 352222 task_exit.go:204] [ 940: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.785377 352222 task_exit.go:204] [ 940: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.785416 352222 task_signals.go:204] [ 940: 943] Signal 940, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.785437 352222 task_signals.go:204] [ 940: 942] Signal 940, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.785450 352222 task_exit.go:204] [ 940: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.785502 352222 task_exit.go:204] [ 940: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.785526 352222 task_exit.go:204] [ 940: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.785552 352222 task_signals.go:204] [ 940: 944] Signal 940, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.785569 352222 task_exit.go:204] [ 940: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.785575 352222 task_exit.go:204] [ 940: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.785596 352222 task_exit.go:204] [ 940: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.785621 352222 task_signals.go:204] [ 940: 941] Signal 940, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.785648 352222 task_exit.go:204] [ 940: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.785687 352222 task_exit.go:204] [ 940: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.785709 352222 task_exit.go:204] [ 940: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.785754 352222 task_exit.go:204] [ 940: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.787193 352222 task_exit.go:204] [ 940: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.787220 352222 task_exit.go:204] [ 940: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.787240 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.787276 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.787287 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.787408 352222 task_exit.go:204] [ 940: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.788071 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.789714 352222 syscalls.go:262] [ 945: 945] Allocating stack with size of 8388608 bytes D0713 08:46:00.789928 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.791346 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.791402 352222 usertrap_amd64.go:106] [ 945: 945] Map a usertrap vma at 68000 D0713 08:46:00.791497 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 1 D0713 08:46:00.791527 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:00.791951 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.791977 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 2 D0713 08:46:00.791989 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:00.792693 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.792721 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 3 D0713 08:46:00.792733 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:00.800533 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.800577 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 4 D0713 08:46:00.800594 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:00.801699 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.801721 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 5 D0713 08:46:00.801733 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:00.801792 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.801798 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 6 D0713 08:46:00.801805 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:00.802211 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.802220 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 7 D0713 08:46:00.802227 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:00.802405 352222 usertrap_amd64.go:212] [ 945: 946] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.802443 352222 usertrap_amd64.go:122] [ 945: 946] Allocate a new trap: 0xc0001d9650 8 D0713 08:46:00.802457 352222 usertrap_amd64.go:225] [ 945: 946] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:00.802710 352222 usertrap_amd64.go:212] [ 945: 946] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.802722 352222 usertrap_amd64.go:122] [ 945: 946] Allocate a new trap: 0xc0001d9650 9 D0713 08:46:00.802733 352222 usertrap_amd64.go:225] [ 945: 946] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:00.802928 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.802943 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 10 D0713 08:46:00.802957 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:00.803518 352222 usertrap_amd64.go:212] [ 945: 946] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.803550 352222 usertrap_amd64.go:122] [ 945: 946] Allocate a new trap: 0xc0001d9650 11 D0713 08:46:00.803565 352222 usertrap_amd64.go:225] [ 945: 946] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:00.803673 352222 usertrap_amd64.go:212] [ 945: 946] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.803691 352222 usertrap_amd64.go:122] [ 945: 946] Allocate a new trap: 0xc0001d9650 12 D0713 08:46:00.803701 352222 usertrap_amd64.go:225] [ 945: 946] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:00.803729 352222 task_signals.go:470] [ 945: 945] Notified of signal 23 D0713 08:46:00.803753 352222 task_signals.go:220] [ 945: 945] Signal 23: delivering to handler D0713 08:46:00.810630 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.810656 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 13 D0713 08:46:00.810665 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:00.814561 352222 task_signals.go:470] [ 945: 945] Notified of signal 23 D0713 08:46:00.814606 352222 task_signals.go:179] [ 945: 945] Restarting syscall 202: interrupted by signal 23 D0713 08:46:00.814622 352222 task_signals.go:220] [ 945: 945] Signal 23: delivering to handler D0713 08:46:00.820970 352222 usertrap_amd64.go:212] [ 945: 945] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.821006 352222 usertrap_amd64.go:122] [ 945: 945] Allocate a new trap: 0xc0001d9650 14 D0713 08:46:00.821025 352222 usertrap_amd64.go:225] [ 945: 945] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:00.821091 352222 task_exit.go:204] [ 945: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.821132 352222 task_exit.go:204] [ 945: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.821155 352222 task_signals.go:204] [ 945: 947] Signal 945, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.821177 352222 task_signals.go:204] [ 945: 949] Signal 945, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.821176 352222 task_signals.go:204] [ 945: 948] Signal 945, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.821191 352222 task_exit.go:204] [ 945: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.821213 352222 task_exit.go:204] [ 945: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.821273 352222 task_signals.go:204] [ 945: 946] Signal 945, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.821308 352222 task_exit.go:204] [ 945: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.821317 352222 task_exit.go:204] [ 945: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.821337 352222 task_exit.go:204] [ 945: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.821363 352222 task_exit.go:204] [ 945: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.821372 352222 task_exit.go:204] [ 945: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.821394 352222 task_exit.go:204] [ 945: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.821403 352222 task_exit.go:204] [ 945: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.821418 352222 task_exit.go:204] [ 945: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.823507 352222 task_exit.go:204] [ 945: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.823545 352222 task_exit.go:204] [ 945: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.823561 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.823607 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.823633 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.823688 352222 task_exit.go:204] [ 945: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.823860 352222 task_signals.go:470] [ 5: 11] Notified of signal 23 D0713 08:46:00.823920 352222 task_signals.go:220] [ 5: 11] Signal 23: delivering to handler D0713 08:46:00.829793 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.831093 352222 syscalls.go:262] [ 950: 950] Allocating stack with size of 8388608 bytes D0713 08:46:00.831201 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.832298 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.832331 352222 usertrap_amd64.go:106] [ 950: 950] Map a usertrap vma at 62000 D0713 08:46:00.832420 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 1 D0713 08:46:00.832451 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:46:00.832873 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.832894 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 2 D0713 08:46:00.832905 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:46:00.833376 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.833393 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 3 D0713 08:46:00.833401 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:46:00.839341 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.839367 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 4 D0713 08:46:00.839376 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:46:00.840429 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.840446 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 5 D0713 08:46:00.840452 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:46:00.840466 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.840471 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 6 D0713 08:46:00.840475 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:46:00.840844 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.840858 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 7 D0713 08:46:00.840863 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:46:00.841012 352222 usertrap_amd64.go:212] [ 950: 951] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.841039 352222 usertrap_amd64.go:122] [ 950: 951] Allocate a new trap: 0xc00097b860 8 D0713 08:46:00.841053 352222 usertrap_amd64.go:225] [ 950: 951] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:46:00.841272 352222 usertrap_amd64.go:212] [ 950: 951] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.841302 352222 usertrap_amd64.go:122] [ 950: 951] Allocate a new trap: 0xc00097b860 9 D0713 08:46:00.841311 352222 usertrap_amd64.go:225] [ 950: 951] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:46:00.841326 352222 usertrap_amd64.go:212] [ 950: 952] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:00.841332 352222 usertrap_amd64.go:122] [ 950: 952] Allocate a new trap: 0xc00097b860 10 D0713 08:46:00.841338 352222 usertrap_amd64.go:225] [ 950: 952] Apply the binary patch addr 46b6e0 trap addr 62320 ([184 24 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:46:00.841415 352222 usertrap_amd64.go:212] [ 950: 952] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.841426 352222 usertrap_amd64.go:122] [ 950: 952] Allocate a new trap: 0xc00097b860 11 D0713 08:46:00.841434 352222 usertrap_amd64.go:225] [ 950: 952] Apply the binary patch addr 46b57c trap addr 62370 ([184 202 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:46:00.849142 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.849154 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 12 D0713 08:46:00.849162 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:46:00.852734 352222 usertrap_amd64.go:212] [ 950: 951] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.852785 352222 usertrap_amd64.go:122] [ 950: 951] Allocate a new trap: 0xc00097b860 13 D0713 08:46:00.852804 352222 usertrap_amd64.go:225] [ 950: 951] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:46:00.852999 352222 usertrap_amd64.go:212] [ 950: 951] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.853012 352222 usertrap_amd64.go:122] [ 950: 951] Allocate a new trap: 0xc00097b860 14 D0713 08:46:00.853022 352222 usertrap_amd64.go:225] [ 950: 951] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:46:00.853097 352222 task_signals.go:470] [ 950: 950] Notified of signal 23 D0713 08:46:00.853199 352222 task_signals.go:220] [ 950: 950] Signal 23: delivering to handler I0713 08:46:00.859459 352222 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 08:46:00.859538 352222 usertrap_amd64.go:212] [ 950: 950] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.859547 352222 usertrap_amd64.go:122] [ 950: 950] Allocate a new trap: 0xc00097b860 15 D0713 08:46:00.859555 352222 usertrap_amd64.go:225] [ 950: 950] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:46:00.859634 352222 task_exit.go:204] [ 950: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.859655 352222 task_exit.go:204] [ 950: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.859678 352222 task_signals.go:204] [ 950: 953] Signal 950, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.859687 352222 task_signals.go:204] [ 950: 951] Signal 950, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.859700 352222 task_exit.go:204] [ 950: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.859706 352222 task_exit.go:204] [ 950: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.859718 352222 task_exit.go:204] [ 950: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.859732 352222 task_exit.go:204] [ 950: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.859753 352222 task_signals.go:204] [ 950: 954] Signal 950, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.859751 352222 task_signals.go:204] [ 950: 952] Signal 950, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.859764 352222 task_exit.go:204] [ 950: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.859773 352222 task_exit.go:204] [ 950: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.859811 352222 task_exit.go:204] [ 950: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.859819 352222 task_exit.go:204] [ 950: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.859834 352222 task_exit.go:204] [ 950: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.859840 352222 task_exit.go:204] [ 950: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.861356 352222 task_exit.go:204] [ 950: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.861392 352222 task_exit.go:204] [ 950: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.861408 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.861445 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.861484 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.861572 352222 task_exit.go:204] [ 950: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.862180 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.863658 352222 syscalls.go:262] [ 955: 955] Allocating stack with size of 8388608 bytes D0713 08:46:00.863781 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.865240 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.865274 352222 usertrap_amd64.go:106] [ 955: 955] Map a usertrap vma at 66000 D0713 08:46:00.865383 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 1 D0713 08:46:00.865400 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:00.865747 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.865761 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 2 D0713 08:46:00.865767 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:00.866501 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.866537 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 3 D0713 08:46:00.866550 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:00.872489 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.872525 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 4 D0713 08:46:00.872540 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:00.873696 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.873718 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 5 D0713 08:46:00.873726 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:00.873771 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.873776 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 6 D0713 08:46:00.873784 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:00.873991 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.874008 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 7 D0713 08:46:00.874016 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:00.874175 352222 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.874197 352222 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc00097bb60 8 D0713 08:46:00.874205 352222 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:00.874372 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.874392 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 9 D0713 08:46:00.874399 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:00.874414 352222 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.874419 352222 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc00097bb60 10 D0713 08:46:00.874426 352222 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:00.881910 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.881939 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 11 D0713 08:46:00.881953 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:00.884720 352222 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.884758 352222 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc00097bb60 12 D0713 08:46:00.884775 352222 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:00.884831 352222 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.884839 352222 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc00097bb60 13 D0713 08:46:00.884846 352222 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:00.884864 352222 task_signals.go:470] [ 955: 955] Notified of signal 23 D0713 08:46:00.884970 352222 task_signals.go:220] [ 955: 955] Signal 23: delivering to handler I0713 08:46:00.892348 352222 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 08:46:00.892452 352222 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.892471 352222 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc00097bb60 14 D0713 08:46:00.892486 352222 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:00.892547 352222 task_exit.go:204] [ 955: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.892562 352222 task_exit.go:204] [ 955: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.892585 352222 task_signals.go:204] [ 955: 958] Signal 955, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.892607 352222 task_exit.go:204] [ 955: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.892599 352222 task_signals.go:204] [ 955: 957] Signal 955, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.892618 352222 task_exit.go:204] [ 955: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.892627 352222 task_exit.go:204] [ 955: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.892644 352222 task_signals.go:204] [ 955: 959] Signal 955, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.892690 352222 task_exit.go:204] [ 955: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.892747 352222 task_signals.go:204] [ 955: 956] Signal 955, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.892790 352222 task_exit.go:204] [ 955: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.892802 352222 task_exit.go:204] [ 955: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.892826 352222 task_exit.go:204] [ 955: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.892863 352222 task_exit.go:204] [ 955: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.892882 352222 task_exit.go:204] [ 955: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.892896 352222 task_exit.go:204] [ 955: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.894445 352222 task_exit.go:204] [ 955: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.894473 352222 task_exit.go:204] [ 955: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.894485 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.894516 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.894529 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.894626 352222 task_exit.go:204] [ 955: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.895327 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.897649 352222 syscalls.go:262] [ 960: 960] Allocating stack with size of 8388608 bytes D0713 08:46:00.897787 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.899129 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.899168 352222 usertrap_amd64.go:106] [ 960: 960] Map a usertrap vma at 64000 D0713 08:46:00.899237 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 1 D0713 08:46:00.899253 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:00.899919 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.899942 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 2 D0713 08:46:00.899952 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:00.900653 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.900670 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 3 D0713 08:46:00.900677 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:00.907100 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.907125 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 4 D0713 08:46:00.907134 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:00.908230 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.908249 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 5 D0713 08:46:00.908260 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:00.908313 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.908327 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 6 D0713 08:46:00.908332 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:00.908771 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.908787 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 7 D0713 08:46:00.908793 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:00.908920 352222 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.908935 352222 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc000c27350 8 D0713 08:46:00.908965 352222 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:00.909140 352222 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:00.909168 352222 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc000c27350 9 D0713 08:46:00.909180 352222 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b6e0 trap addr 642d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:00.909338 352222 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.909363 352222 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc000c27350 10 D0713 08:46:00.909385 352222 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:00.909430 352222 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.909442 352222 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc000c27350 11 D0713 08:46:00.909453 352222 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:00.909927 352222 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.909956 352222 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc000c27350 12 D0713 08:46:00.909966 352222 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:00.910020 352222 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.910041 352222 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc000c27350 13 D0713 08:46:00.910049 352222 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:00.910065 352222 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 08:46:00.910092 352222 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0713 08:46:00.917258 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.917290 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 14 D0713 08:46:00.917297 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46af29 trap addr 64460 ([184 37 1 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:00.921193 352222 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 08:46:00.921249 352222 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler I0713 08:46:00.927969 352222 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 08:46:00.928088 352222 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.928097 352222 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc000c27350 15 D0713 08:46:00.928107 352222 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:46:00.928235 352222 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.928263 352222 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.928279 352222 task_signals.go:204] [ 960: 963] Signal 960, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.928293 352222 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.928303 352222 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.928309 352222 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.928276 352222 task_signals.go:204] [ 960: 962] Signal 960, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.928363 352222 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.928438 352222 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.928323 352222 task_signals.go:204] [ 960: 964] Signal 960, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.928459 352222 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.928330 352222 task_signals.go:204] [ 960: 961] Signal 960, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.928516 352222 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.928571 352222 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.928587 352222 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.928598 352222 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.930340 352222 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.930382 352222 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.930395 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.930427 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.930454 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.930610 352222 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.931136 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.932563 352222 syscalls.go:262] [ 965: 965] Allocating stack with size of 8388608 bytes D0713 08:46:00.932651 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.933980 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.934031 352222 usertrap_amd64.go:106] [ 965: 965] Map a usertrap vma at 68000 D0713 08:46:00.934151 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 1 D0713 08:46:00.934189 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:00.934754 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.934782 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 2 D0713 08:46:00.934794 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:00.935253 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.935273 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 3 D0713 08:46:00.935279 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:00.941238 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.941266 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 4 D0713 08:46:00.941280 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:00.942481 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.942507 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 5 D0713 08:46:00.942525 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:00.942612 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.942654 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 6 D0713 08:46:00.942670 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:00.943168 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.943187 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 7 D0713 08:46:00.943194 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:00.943341 352222 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.943368 352222 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc000c273b0 8 D0713 08:46:00.943393 352222 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:00.943556 352222 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.943574 352222 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc000c273b0 9 D0713 08:46:00.943584 352222 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:00.943597 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.943603 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 10 D0713 08:46:00.943611 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:00.950978 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.951007 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 11 D0713 08:46:00.951020 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:00.953845 352222 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.953873 352222 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc000c273b0 12 D0713 08:46:00.953893 352222 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:00.953966 352222 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.953981 352222 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc000c273b0 13 D0713 08:46:00.953989 352222 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:00.954007 352222 task_signals.go:470] [ 965: 965] Notified of signal 23 D0713 08:46:00.954096 352222 task_signals.go:220] [ 965: 965] Signal 23: delivering to handler I0713 08:46:00.961683 352222 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 08:46:00.961761 352222 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.961770 352222 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc000c273b0 14 D0713 08:46:00.961777 352222 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:00.961806 352222 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.961869 352222 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.961890 352222 task_signals.go:204] [ 965: 967] Signal 965, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.961918 352222 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.961928 352222 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.961933 352222 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.961944 352222 task_signals.go:204] [ 965: 966] Signal 965, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.961965 352222 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.961973 352222 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.961977 352222 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.961986 352222 task_signals.go:204] [ 965: 968] Signal 965, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.961994 352222 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.961999 352222 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.962003 352222 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.962011 352222 task_signals.go:204] [ 965: 969] Signal 965, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.962018 352222 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.963402 352222 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.963420 352222 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.963434 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.963454 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.963474 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.963616 352222 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.964173 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.965488 352222 syscalls.go:262] [ 970: 970] Allocating stack with size of 8388608 bytes D0713 08:46:00.965573 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.966623 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:00.966644 352222 usertrap_amd64.go:106] [ 970: 970] Map a usertrap vma at 67000 D0713 08:46:00.966723 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 1 D0713 08:46:00.966750 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:00.967238 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:00.967254 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 2 D0713 08:46:00.967264 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:00.967967 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:00.967993 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 3 D0713 08:46:00.968006 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:00.974228 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:00.974255 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 4 D0713 08:46:00.974266 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:00.975484 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:00.975507 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 5 D0713 08:46:00.975515 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:00.976064 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b214:sysno 13 D0713 08:46:00.976080 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 6 D0713 08:46:00.976086 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:00.976462 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:00.976476 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 7 D0713 08:46:00.976482 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:00.976540 352222 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:00.976547 352222 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0019304b0 8 D0713 08:46:00.976555 352222 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:00.976712 352222 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46af76:sysno 35 D0713 08:46:00.976735 352222 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0019304b0 9 D0713 08:46:00.976748 352222 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:00.976846 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:00.976873 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 10 D0713 08:46:00.976885 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:00.977424 352222 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b020:sysno 39 D0713 08:46:00.977452 352222 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0019304b0 11 D0713 08:46:00.977464 352222 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:00.977524 352222 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:00.977540 352222 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0019304b0 12 D0713 08:46:00.977548 352222 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:00.977576 352222 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 08:46:00.977658 352222 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler D0713 08:46:00.984124 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46af29:sysno 293 D0713 08:46:00.984147 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 13 D0713 08:46:00.984155 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:00.988428 352222 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 08:46:00.988463 352222 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler I0713 08:46:00.994456 352222 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 08:46:00.994532 352222 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:00.994540 352222 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0019304b0 14 D0713 08:46:00.994547 352222 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:00.994571 352222 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.994595 352222 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.994598 352222 task_signals.go:204] [ 970: 972] Signal 970, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.994609 352222 task_signals.go:204] [ 970: 974] Signal 970, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.994616 352222 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.994627 352222 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.994618 352222 task_signals.go:204] [ 970: 973] Signal 970, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.994632 352222 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.994643 352222 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.994654 352222 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.994659 352222 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.994663 352222 task_signals.go:204] [ 970: 971] Signal 970, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.994678 352222 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.994684 352222 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.994687 352222 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.994694 352222 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.994699 352222 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.994703 352222 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.994716 352222 task_signals.go:204] [ 970: 975] Signal 970, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:00.994722 352222 task_exit.go:204] [ 970: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:00.996132 352222 task_exit.go:204] [ 970: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:00.996154 352222 task_exit.go:204] [ 970: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.996162 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:00.996186 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:00.996192 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:00.996302 352222 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:00.996886 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:00.998732 352222 syscalls.go:262] [ 976: 976] Allocating stack with size of 8388608 bytes D0713 08:46:00.998851 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.000185 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.000221 352222 usertrap_amd64.go:106] [ 976: 976] Map a usertrap vma at 64000 D0713 08:46:01.000286 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 1 D0713 08:46:01.000311 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.000611 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.000638 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 2 D0713 08:46:01.000650 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.001356 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.001386 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 3 D0713 08:46:01.001399 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.007691 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.007760 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 4 D0713 08:46:01.007780 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.008930 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.008989 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 5 D0713 08:46:01.009002 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.009069 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.009076 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 6 D0713 08:46:01.009081 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.009636 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.009662 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 7 D0713 08:46:01.009672 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.009814 352222 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.009840 352222 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0005cc4b0 8 D0713 08:46:01.009854 352222 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.010035 352222 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.010058 352222 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0005cc4b0 9 D0713 08:46:01.010068 352222 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.010177 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.010196 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 10 D0713 08:46:01.010259 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.017817 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.017846 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 11 D0713 08:46:01.017865 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.021487 352222 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.021512 352222 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0005cc4b0 12 D0713 08:46:01.021521 352222 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.021545 352222 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.021560 352222 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0005cc4b0 13 D0713 08:46:01.021571 352222 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.021657 352222 task_signals.go:470] [ 976: 976] Notified of signal 23 D0713 08:46:01.021743 352222 task_signals.go:220] [ 976: 976] Signal 23: delivering to handler I0713 08:46:01.028563 352222 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 08:46:01.028657 352222 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.028677 352222 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0005cc4b0 14 D0713 08:46:01.028696 352222 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.028778 352222 task_exit.go:204] [ 976: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.028801 352222 task_exit.go:204] [ 976: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.028816 352222 task_signals.go:204] [ 976: 978] Signal 976, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.028850 352222 task_signals.go:204] [ 976: 977] Signal 976, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.028857 352222 task_exit.go:204] [ 976: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.028858 352222 task_signals.go:204] [ 976: 980] Signal 976, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.028826 352222 task_signals.go:204] [ 976: 979] Signal 976, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.028882 352222 task_exit.go:204] [ 976: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.028902 352222 task_exit.go:204] [ 976: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.028919 352222 task_exit.go:204] [ 976: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.028922 352222 task_signals.go:204] [ 976: 981] Signal 976, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.028966 352222 task_exit.go:204] [ 976: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.028974 352222 task_exit.go:204] [ 976: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.028985 352222 task_exit.go:204] [ 976: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.028994 352222 task_exit.go:204] [ 976: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.029000 352222 task_exit.go:204] [ 976: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.029007 352222 task_exit.go:204] [ 976: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.029013 352222 task_exit.go:204] [ 976: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.029017 352222 task_exit.go:204] [ 976: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.029024 352222 task_exit.go:204] [ 976: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.030506 352222 task_exit.go:204] [ 976: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.030534 352222 task_exit.go:204] [ 976: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.030543 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.030572 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.030592 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.030708 352222 task_exit.go:204] [ 976: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.031258 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.032808 352222 syscalls.go:262] [ 982: 982] Allocating stack with size of 8388608 bytes D0713 08:46:01.032903 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.034104 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.034142 352222 usertrap_amd64.go:106] [ 982: 982] Map a usertrap vma at 64000 D0713 08:46:01.034257 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 1 D0713 08:46:01.034332 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.034817 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.034842 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 2 D0713 08:46:01.034852 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.035434 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.035455 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 3 D0713 08:46:01.035462 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.040614 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.040638 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 4 D0713 08:46:01.040648 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.041981 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.042001 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 5 D0713 08:46:01.042007 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.042035 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.042048 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 6 D0713 08:46:01.042056 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.042607 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.042615 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 7 D0713 08:46:01.042623 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.042734 352222 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.042755 352222 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0005cc870 8 D0713 08:46:01.042763 352222 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.042965 352222 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.042991 352222 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0005cc870 9 D0713 08:46:01.043008 352222 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.043035 352222 usertrap_amd64.go:212] [ 982: 985] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.043051 352222 usertrap_amd64.go:122] [ 982: 985] Allocate a new trap: 0xc0005cc870 10 D0713 08:46:01.043075 352222 usertrap_amd64.go:225] [ 982: 985] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.050764 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.050787 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 11 D0713 08:46:01.050797 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.054405 352222 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.054464 352222 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0005cc870 12 D0713 08:46:01.054484 352222 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.054556 352222 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.054590 352222 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0005cc870 13 D0713 08:46:01.054604 352222 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.054656 352222 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 08:46:01.054754 352222 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler D0713 08:46:01.061396 352222 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.061452 352222 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0005cc870 14 D0713 08:46:01.061476 352222 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.061539 352222 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.061571 352222 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.061590 352222 task_signals.go:204] [ 982: 984] Signal 982, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.061603 352222 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.061609 352222 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.061616 352222 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.061606 352222 task_signals.go:204] [ 982: 986] Signal 982, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.061633 352222 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.061666 352222 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.061671 352222 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.061693 352222 task_signals.go:204] [ 982: 985] Signal 982, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.061709 352222 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.061716 352222 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.061720 352222 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.061735 352222 task_signals.go:204] [ 982: 983] Signal 982, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.061744 352222 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.063378 352222 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.063419 352222 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.063435 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.063478 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.063494 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.063564 352222 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.064145 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.065627 352222 syscalls.go:262] [ 987: 987] Allocating stack with size of 8388608 bytes D0713 08:46:01.065717 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.067049 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.067082 352222 usertrap_amd64.go:106] [ 987: 987] Map a usertrap vma at 63000 D0713 08:46:01.067147 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 1 D0713 08:46:01.067169 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:01.067454 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.067484 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 2 D0713 08:46:01.067501 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:01.068120 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.068136 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 3 D0713 08:46:01.068143 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:01.073910 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.073944 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 4 D0713 08:46:01.073954 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:01.075077 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.075106 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 5 D0713 08:46:01.075122 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:01.075293 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.075342 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 6 D0713 08:46:01.075358 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:01.075827 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.075843 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 7 D0713 08:46:01.075851 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:01.076028 352222 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.076052 352222 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc000c27cb0 8 D0713 08:46:01.076064 352222 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:01.076196 352222 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.076228 352222 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc000c27cb0 9 D0713 08:46:01.076240 352222 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:01.076252 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.076257 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 10 D0713 08:46:01.076264 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:01.083506 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.083533 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 11 D0713 08:46:01.083542 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:01.087409 352222 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.087435 352222 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc000c27cb0 12 D0713 08:46:01.087447 352222 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:01.087518 352222 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.087533 352222 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc000c27cb0 13 D0713 08:46:01.087541 352222 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:01.087607 352222 task_signals.go:470] [ 987: 987] Notified of signal 23 D0713 08:46:01.087646 352222 task_signals.go:220] [ 987: 987] Signal 23: delivering to handler D0713 08:46:01.093640 352222 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.093665 352222 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc000c27cb0 14 D0713 08:46:01.093674 352222 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:01.093732 352222 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.093751 352222 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.093765 352222 task_signals.go:204] [ 987: 989] Signal 987, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.093823 352222 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.093837 352222 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.093843 352222 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.093775 352222 task_signals.go:204] [ 987: 990] Signal 987, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.093857 352222 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.093866 352222 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.093871 352222 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.093788 352222 task_signals.go:204] [ 987: 988] Signal 987, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.093884 352222 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.093892 352222 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.093898 352222 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.093799 352222 task_signals.go:204] [ 987: 991] Signal 987, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.093935 352222 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.095308 352222 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.095340 352222 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.095358 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.095391 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.095412 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.095480 352222 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.095940 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.097757 352222 syscalls.go:262] [ 992: 992] Allocating stack with size of 8388608 bytes D0713 08:46:01.097863 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.099309 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.099345 352222 usertrap_amd64.go:106] [ 992: 992] Map a usertrap vma at 65000 D0713 08:46:01.099437 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 1 D0713 08:46:01.099465 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:46:01.099830 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.099857 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 2 D0713 08:46:01.099871 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:46:01.100267 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.100284 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 3 D0713 08:46:01.100292 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:46:01.105948 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.105969 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 4 D0713 08:46:01.105978 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:46:01.107090 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.107105 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 5 D0713 08:46:01.107112 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:46:01.107130 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.107135 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 6 D0713 08:46:01.107144 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:46:01.107559 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.107574 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 7 D0713 08:46:01.107581 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:46:01.107701 352222 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.107715 352222 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001c1c9c0 8 D0713 08:46:01.107722 352222 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:46:01.107901 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.107918 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 9 D0713 08:46:01.107925 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:46:01.108002 352222 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.108025 352222 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001c1c9c0 10 D0713 08:46:01.108035 352222 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:46:01.115591 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.115620 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 11 D0713 08:46:01.115629 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:46:01.118261 352222 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.118287 352222 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001c1c9c0 12 D0713 08:46:01.118298 352222 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:46:01.118316 352222 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.118320 352222 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001c1c9c0 13 D0713 08:46:01.118325 352222 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:46:01.118352 352222 task_signals.go:470] [ 992: 992] Notified of signal 23 D0713 08:46:01.118403 352222 task_signals.go:220] [ 992: 992] Signal 23: delivering to handler D0713 08:46:01.126345 352222 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.126371 352222 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001c1c9c0 14 D0713 08:46:01.126383 352222 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:46:01.126441 352222 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.126453 352222 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.126478 352222 task_signals.go:204] [ 992: 995] Signal 992, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.126487 352222 task_signals.go:204] [ 992: 993] Signal 992, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.126502 352222 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.126510 352222 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.126514 352222 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.126526 352222 task_signals.go:204] [ 992: 994] Signal 992, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.126534 352222 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.126539 352222 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.126543 352222 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.126536 352222 task_signals.go:204] [ 992: 996] Signal 992, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.126550 352222 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.126579 352222 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.126594 352222 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.126609 352222 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.128111 352222 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.128152 352222 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.128171 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.128288 352222 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.128270 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.128342 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.128360 352222 task_signals.go:470] [ 5: 9] Notified of signal 23 D0713 08:46:01.128401 352222 task_signals.go:220] [ 5: 9] Signal 23: delivering to handler I0713 08:46:01.128516 352222 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 08:46:01.129101 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.130705 352222 syscalls.go:262] [ 997: 997] Allocating stack with size of 8388608 bytes D0713 08:46:01.130900 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.131779 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.131814 352222 usertrap_amd64.go:106] [ 997: 997] Map a usertrap vma at 68000 D0713 08:46:01.131880 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 1 D0713 08:46:01.131901 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:01.132263 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.132281 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 2 D0713 08:46:01.132287 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:01.132763 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.132816 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 3 D0713 08:46:01.132839 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:01.138945 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.138974 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 4 D0713 08:46:01.138987 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:01.140159 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.140174 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 5 D0713 08:46:01.140182 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:01.140199 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.140208 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 6 D0713 08:46:01.140213 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:01.140612 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.140630 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 7 D0713 08:46:01.140636 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:01.140727 352222 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.140744 352222 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001c1cb10 8 D0713 08:46:01.140750 352222 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:01.140931 352222 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.140987 352222 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001c1cb10 9 D0713 08:46:01.140996 352222 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:01.141162 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.141187 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 10 D0713 08:46:01.141198 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:01.148039 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.148064 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 11 D0713 08:46:01.148072 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:01.152017 352222 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.152057 352222 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001c1cb10 12 D0713 08:46:01.152075 352222 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:01.152116 352222 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.152123 352222 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc001c1cb10 13 D0713 08:46:01.152129 352222 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:01.152154 352222 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 08:46:01.152251 352222 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler I0713 08:46:01.158172 352222 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 08:46:01.158251 352222 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.158259 352222 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc001c1cb10 14 D0713 08:46:01.158268 352222 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:01.158297 352222 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.158312 352222 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.158332 352222 task_signals.go:204] [ 997: 1001] Signal 997, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.158351 352222 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.158348 352222 task_signals.go:204] [ 997: 1000] Signal 997, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.158357 352222 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.158332 352222 task_signals.go:204] [ 997: 999] Signal 997, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.158361 352222 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.158372 352222 task_signals.go:204] [ 997: 998] Signal 997, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.158384 352222 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.158425 352222 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.158435 352222 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.158451 352222 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.158476 352222 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.158482 352222 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.158493 352222 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.159848 352222 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.159875 352222 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.159894 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.159956 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.159966 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.160076 352222 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.160643 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.161997 352222 syscalls.go:262] [ 1002: 1002] Allocating stack with size of 8388608 bytes D0713 08:46:01.162131 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.163346 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.163381 352222 usertrap_amd64.go:106] [ 1002: 1002] Map a usertrap vma at 68000 D0713 08:46:01.163484 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 1 D0713 08:46:01.163517 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:01.163914 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.163928 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 2 D0713 08:46:01.163937 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:01.164461 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.164481 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 3 D0713 08:46:01.164488 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:01.169742 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.169773 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 4 D0713 08:46:01.169786 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:01.170837 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.170863 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 5 D0713 08:46:01.170874 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:01.170926 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.170940 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 6 D0713 08:46:01.170946 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:01.171274 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.171289 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 7 D0713 08:46:01.171295 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:01.171360 352222 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.171369 352222 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c1cb70 8 D0713 08:46:01.171375 352222 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:01.171600 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.171622 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 9 D0713 08:46:01.171632 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:01.171700 352222 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.171718 352222 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c1cb70 10 D0713 08:46:01.171727 352222 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:01.179065 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.179122 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 11 D0713 08:46:01.179138 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:01.182778 352222 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.182807 352222 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c1cb70 12 D0713 08:46:01.182821 352222 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:01.182902 352222 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.182934 352222 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc001c1cb70 13 D0713 08:46:01.182945 352222 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:01.183011 352222 task_signals.go:470] [ 1002: 1002] Notified of signal 23 D0713 08:46:01.183087 352222 task_signals.go:220] [ 1002: 1002] Signal 23: delivering to handler I0713 08:46:01.188748 352222 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 08:46:01.188856 352222 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.188872 352222 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc001c1cb70 14 D0713 08:46:01.188879 352222 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:01.188969 352222 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.188996 352222 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.189009 352222 task_signals.go:204] [ 1002: 1004] Signal 1002, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.189008 352222 task_signals.go:204] [ 1002: 1006] Signal 1002, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.189013 352222 task_signals.go:204] [ 1002: 1003] Signal 1002, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.189020 352222 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.189038 352222 task_signals.go:204] [ 1002: 1005] Signal 1002, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.189056 352222 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.189064 352222 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.189087 352222 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.189095 352222 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.189099 352222 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.189106 352222 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.189114 352222 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.189118 352222 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.189133 352222 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.190206 352222 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.190231 352222 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.190242 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.190271 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.190298 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.190384 352222 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.191001 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.192287 352222 syscalls.go:262] [ 1007: 1007] Allocating stack with size of 8388608 bytes D0713 08:46:01.192372 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.193526 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.193595 352222 usertrap_amd64.go:106] [ 1007: 1007] Map a usertrap vma at 69000 D0713 08:46:01.193712 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 1 D0713 08:46:01.193748 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:46:01.194179 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.194198 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 2 D0713 08:46:01.194208 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:46:01.194710 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.194728 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 3 D0713 08:46:01.194737 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:46:01.199531 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.199565 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 4 D0713 08:46:01.199582 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:46:01.200649 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.200672 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 5 D0713 08:46:01.200682 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:46:01.200736 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.200742 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 6 D0713 08:46:01.200747 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:46:01.201047 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.201072 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 7 D0713 08:46:01.201081 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:46:01.201205 352222 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.201221 352222 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001930e40 8 D0713 08:46:01.201227 352222 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:46:01.201389 352222 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.201415 352222 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001930e40 9 D0713 08:46:01.201425 352222 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:46:01.201529 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.201561 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 10 D0713 08:46:01.201574 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:46:01.209170 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.209203 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 11 D0713 08:46:01.209215 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:46:01.211754 352222 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.211781 352222 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001930e40 12 D0713 08:46:01.211791 352222 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:46:01.211856 352222 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.211862 352222 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001930e40 13 D0713 08:46:01.211867 352222 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:46:01.211883 352222 task_signals.go:470] [ 1007: 1007] Notified of signal 23 D0713 08:46:01.211970 352222 task_signals.go:220] [ 1007: 1007] Signal 23: delivering to handler D0713 08:46:01.219665 352222 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.219700 352222 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001930e40 14 D0713 08:46:01.219717 352222 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:46:01.219793 352222 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.219824 352222 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.219852 352222 task_signals.go:204] [ 1007: 1010] Signal 1007, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.219883 352222 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.219878 352222 task_signals.go:204] [ 1007: 1008] Signal 1007, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.219896 352222 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.219903 352222 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.219844 352222 task_signals.go:204] [ 1007: 1009] Signal 1007, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.219922 352222 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.219919 352222 task_signals.go:204] [ 1007: 1011] Signal 1007, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.219933 352222 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.219941 352222 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.219955 352222 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.219967 352222 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.219974 352222 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.219985 352222 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.221780 352222 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.221823 352222 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.221837 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.221926 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.221991 352222 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.222003 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.222664 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.224286 352222 syscalls.go:262] [ 1012: 1012] Allocating stack with size of 8388608 bytes D0713 08:46:01.224724 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.225897 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.225946 352222 usertrap_amd64.go:106] [ 1012: 1012] Map a usertrap vma at 60000 D0713 08:46:01.226037 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 1 D0713 08:46:01.226075 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:01.226466 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.226493 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 2 D0713 08:46:01.226504 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:01.227161 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.227190 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 3 D0713 08:46:01.227202 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:01.232678 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.232725 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 4 D0713 08:46:01.232741 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:01.233831 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.233869 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 5 D0713 08:46:01.233880 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:01.233941 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.233953 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 6 D0713 08:46:01.233959 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:01.234163 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.234180 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 7 D0713 08:46:01.234188 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:01.234317 352222 usertrap_amd64.go:212] [ 1012: 1013] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.234341 352222 usertrap_amd64.go:122] [ 1012: 1013] Allocate a new trap: 0xc000fa0240 8 D0713 08:46:01.234350 352222 usertrap_amd64.go:225] [ 1012: 1013] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:01.234587 352222 usertrap_amd64.go:212] [ 1012: 1013] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.234614 352222 usertrap_amd64.go:122] [ 1012: 1013] Allocate a new trap: 0xc000fa0240 9 D0713 08:46:01.234629 352222 usertrap_amd64.go:225] [ 1012: 1013] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:01.234641 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.234646 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 10 D0713 08:46:01.234733 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:01.241550 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.241576 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 11 D0713 08:46:01.241585 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:01.245207 352222 usertrap_amd64.go:212] [ 1012: 1013] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.245232 352222 usertrap_amd64.go:122] [ 1012: 1013] Allocate a new trap: 0xc000fa0240 12 D0713 08:46:01.245242 352222 usertrap_amd64.go:225] [ 1012: 1013] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:01.245270 352222 usertrap_amd64.go:212] [ 1012: 1013] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.245300 352222 usertrap_amd64.go:122] [ 1012: 1013] Allocate a new trap: 0xc000fa0240 13 D0713 08:46:01.245317 352222 usertrap_amd64.go:225] [ 1012: 1013] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:01.245390 352222 task_signals.go:470] [ 1012: 1012] Notified of signal 23 D0713 08:46:01.245485 352222 task_signals.go:220] [ 1012: 1012] Signal 23: delivering to handler D0713 08:46:01.250942 352222 usertrap_amd64.go:212] [ 1012: 1012] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.250966 352222 usertrap_amd64.go:122] [ 1012: 1012] Allocate a new trap: 0xc000fa0240 14 D0713 08:46:01.250975 352222 usertrap_amd64.go:225] [ 1012: 1012] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:01.251033 352222 task_exit.go:204] [ 1012: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.251044 352222 task_exit.go:204] [ 1012: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.251064 352222 task_signals.go:204] [ 1012: 1015] Signal 1012, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.251075 352222 task_signals.go:204] [ 1012: 1014] Signal 1012, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.251090 352222 task_exit.go:204] [ 1012: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.251115 352222 task_exit.go:204] [ 1012: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.251127 352222 task_exit.go:204] [ 1012: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.251160 352222 task_signals.go:204] [ 1012: 1013] Signal 1012, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.251172 352222 task_exit.go:204] [ 1012: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.251177 352222 task_exit.go:204] [ 1012: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.251182 352222 task_exit.go:204] [ 1012: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.251193 352222 task_signals.go:204] [ 1012: 1016] Signal 1012, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.251201 352222 task_exit.go:204] [ 1012: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.251205 352222 task_exit.go:204] [ 1012: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.251210 352222 task_exit.go:204] [ 1012: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.251216 352222 task_exit.go:204] [ 1012: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.251222 352222 task_exit.go:204] [ 1012: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.251225 352222 task_exit.go:204] [ 1012: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.251236 352222 task_signals.go:204] [ 1012: 1017] Signal 1012, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.251244 352222 task_exit.go:204] [ 1012: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.252416 352222 task_exit.go:204] [ 1012: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.252449 352222 task_exit.go:204] [ 1012: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.252466 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.252495 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.252507 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.252567 352222 task_exit.go:204] [ 1012: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.253093 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.254317 352222 syscalls.go:262] [ 1018: 1018] Allocating stack with size of 8388608 bytes D0713 08:46:01.254413 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.255537 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.255567 352222 usertrap_amd64.go:106] [ 1018: 1018] Map a usertrap vma at 64000 D0713 08:46:01.255634 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 1 D0713 08:46:01.255650 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.256028 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.256039 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 2 D0713 08:46:01.256050 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.256397 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.256422 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 3 D0713 08:46:01.256428 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.260864 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.260889 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 4 D0713 08:46:01.260895 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.261869 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.261896 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 5 D0713 08:46:01.261905 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.261953 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.261959 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 6 D0713 08:46:01.261966 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.262124 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.262138 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 7 D0713 08:46:01.262144 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.262241 352222 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.262256 352222 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc000fa0360 8 D0713 08:46:01.262262 352222 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.262326 352222 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.262351 352222 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc000fa0360 9 D0713 08:46:01.262360 352222 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.262450 352222 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.262476 352222 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc000fa0360 10 D0713 08:46:01.262482 352222 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b020 trap addr 64320 ([184 39 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.262535 352222 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.262551 352222 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc000fa0360 11 D0713 08:46:01.262561 352222 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b04f trap addr 64370 ([184 234 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.262577 352222 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0713 08:46:01.262676 352222 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0713 08:46:01.262779 352222 task_signals.go:481] [ 1018: 1018] No task notified of signal 23 D0713 08:46:01.262831 352222 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0713 08:46:01.262924 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.262942 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 12 D0713 08:46:01.262949 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b57c trap addr 643c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.268768 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.268794 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 13 D0713 08:46:01.268804 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.273763 352222 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0713 08:46:01.274366 352222 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0713 08:46:01.277582 352222 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.277654 352222 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc000fa0360 14 D0713 08:46:01.277675 352222 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.277760 352222 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.277795 352222 task_signals.go:204] [ 1018: 1020] Signal 1018, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.277794 352222 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.277843 352222 task_signals.go:204] [ 1018: 1019] Signal 1018, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.277858 352222 task_signals.go:204] [ 1018: 1021] Signal 1018, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.277871 352222 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.277886 352222 task_signals.go:204] [ 1018: 1022] Signal 1018, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.277905 352222 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.277909 352222 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.277930 352222 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.277935 352222 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.277939 352222 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.277946 352222 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.277953 352222 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.277958 352222 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.277965 352222 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.278845 352222 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.278870 352222 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.278880 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.278905 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.278916 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.279127 352222 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.279887 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.281219 352222 syscalls.go:262] [ 1023: 1023] Allocating stack with size of 8388608 bytes D0713 08:46:01.281343 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.282290 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.282329 352222 usertrap_amd64.go:106] [ 1023: 1023] Map a usertrap vma at 64000 D0713 08:46:01.282413 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 1 D0713 08:46:01.282439 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.282712 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.282738 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 2 D0713 08:46:01.282748 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.283541 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.283567 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 3 D0713 08:46:01.283580 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.289625 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.289652 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 4 D0713 08:46:01.289661 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.290585 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.290604 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 5 D0713 08:46:01.290611 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.290622 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.290626 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 6 D0713 08:46:01.290631 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.290771 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.290785 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 7 D0713 08:46:01.290791 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.290878 352222 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.290898 352222 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001c1cdb0 8 D0713 08:46:01.290904 352222 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.291122 352222 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.291144 352222 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001c1cdb0 9 D0713 08:46:01.291153 352222 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.291165 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.291180 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 10 D0713 08:46:01.291189 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.297812 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.297838 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 11 D0713 08:46:01.297848 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.301902 352222 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.301936 352222 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001c1cdb0 12 D0713 08:46:01.301949 352222 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.301973 352222 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.301978 352222 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc001c1cdb0 13 D0713 08:46:01.301983 352222 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.302036 352222 task_signals.go:470] [ 1023: 1023] Notified of signal 23 D0713 08:46:01.302068 352222 task_signals.go:220] [ 1023: 1023] Signal 23: delivering to handler D0713 08:46:01.307800 352222 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.307831 352222 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc001c1cdb0 14 D0713 08:46:01.307844 352222 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.308047 352222 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.308078 352222 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.308079 352222 task_signals.go:204] [ 1023: 1025] Signal 1023, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.308102 352222 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.308102 352222 task_signals.go:204] [ 1023: 1027] Signal 1023, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.308112 352222 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.308106 352222 task_signals.go:204] [ 1023: 1026] Signal 1023, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.308117 352222 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.308141 352222 task_signals.go:204] [ 1023: 1024] Signal 1023, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.308152 352222 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.308163 352222 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.308168 352222 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.308157 352222 task_signals.go:204] [ 1023: 1028] Signal 1023, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.308179 352222 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.308205 352222 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.308215 352222 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.308225 352222 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.308242 352222 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.308247 352222 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.308264 352222 task_exit.go:204] [ 1023: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.309455 352222 task_exit.go:204] [ 1023: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.309486 352222 task_exit.go:204] [ 1023: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.309499 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.309536 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.309547 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.309618 352222 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.310356 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.311775 352222 syscalls.go:262] [ 1029: 1029] Allocating stack with size of 8388608 bytes D0713 08:46:01.311890 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.313218 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.313282 352222 usertrap_amd64.go:106] [ 1029: 1029] Map a usertrap vma at 6a000 D0713 08:46:01.313396 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 1 D0713 08:46:01.313435 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:01.313884 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.313910 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 2 D0713 08:46:01.313923 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:01.314805 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.314828 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 3 D0713 08:46:01.314841 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:01.321284 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.321325 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 4 D0713 08:46:01.321336 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:01.322402 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.322427 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 5 D0713 08:46:01.322435 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:01.322487 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.322503 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 6 D0713 08:46:01.322509 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:01.322786 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.322799 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 7 D0713 08:46:01.322806 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:01.322989 352222 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.323006 352222 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc00002b800 8 D0713 08:46:01.323012 352222 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:01.323154 352222 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.323166 352222 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc00002b800 9 D0713 08:46:01.323174 352222 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:01.323340 352222 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.323364 352222 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc00002b800 10 D0713 08:46:01.323371 352222 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:01.323461 352222 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.323475 352222 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc00002b800 11 D0713 08:46:01.323481 352222 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b04f trap addr 6a370 ([184 234 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:01.323510 352222 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 08:46:01.323522 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.323542 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 12 D0713 08:46:01.323569 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b57c trap addr 6a3c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:01.323587 352222 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 08:46:01.330199 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.330225 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 13 D0713 08:46:01.330233 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:01.334799 352222 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 08:46:01.334859 352222 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 08:46:01.341031 352222 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.341071 352222 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc00002b800 14 D0713 08:46:01.341086 352222 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:01.341166 352222 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.341193 352222 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.341198 352222 task_signals.go:204] [ 1029: 1031] Signal 1029, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.341224 352222 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.341252 352222 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.341265 352222 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.341223 352222 task_signals.go:204] [ 1029: 1030] Signal 1029, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.341278 352222 task_signals.go:204] [ 1029: 1033] Signal 1029, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.341225 352222 task_signals.go:204] [ 1029: 1032] Signal 1029, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.341285 352222 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.341310 352222 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.341318 352222 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.341334 352222 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.341348 352222 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.341364 352222 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.341377 352222 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.342619 352222 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.342644 352222 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.342654 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.342682 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.342690 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.342760 352222 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.343222 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.344606 352222 syscalls.go:262] [ 1034: 1034] Allocating stack with size of 8388608 bytes D0713 08:46:01.344743 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.346285 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.346313 352222 usertrap_amd64.go:106] [ 1034: 1034] Map a usertrap vma at 68000 D0713 08:46:01.346432 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 1 D0713 08:46:01.346461 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:01.346931 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.346953 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 2 D0713 08:46:01.346960 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:01.347556 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.347579 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 3 D0713 08:46:01.347588 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:01.353219 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.353249 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 4 D0713 08:46:01.353261 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:01.354243 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.354269 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 5 D0713 08:46:01.354278 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:01.354332 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.354347 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 6 D0713 08:46:01.354351 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:01.354529 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.354541 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 7 D0713 08:46:01.354546 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:01.354699 352222 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.354722 352222 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019315c0 8 D0713 08:46:01.354731 352222 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:01.354939 352222 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.354960 352222 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019315c0 9 D0713 08:46:01.354970 352222 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:01.354984 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.355000 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 10 D0713 08:46:01.355011 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:01.362650 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.362678 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 11 D0713 08:46:01.362687 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:01.365295 352222 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.365349 352222 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019315c0 12 D0713 08:46:01.365367 352222 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:01.365430 352222 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.365445 352222 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0019315c0 13 D0713 08:46:01.365458 352222 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:01.365502 352222 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 08:46:01.365628 352222 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 08:46:01.373045 352222 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.373098 352222 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0019315c0 14 D0713 08:46:01.373113 352222 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:01.373195 352222 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.373221 352222 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.373249 352222 task_signals.go:204] [ 1034: 1037] Signal 1034, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.373245 352222 task_signals.go:204] [ 1034: 1036] Signal 1034, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.373273 352222 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.373294 352222 task_signals.go:204] [ 1034: 1035] Signal 1034, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.373314 352222 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.373319 352222 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.373339 352222 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.373352 352222 task_signals.go:204] [ 1034: 1038] Signal 1034, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.373363 352222 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.373367 352222 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.373378 352222 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.373394 352222 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.373404 352222 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.373413 352222 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.375076 352222 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.375106 352222 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.375121 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.375169 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.375199 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.375262 352222 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.375992 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.377674 352222 syscalls.go:262] [ 1039: 1039] Allocating stack with size of 8388608 bytes D0713 08:46:01.377795 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.379226 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.379271 352222 usertrap_amd64.go:106] [ 1039: 1039] Map a usertrap vma at 63000 D0713 08:46:01.379386 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 1 D0713 08:46:01.379427 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:01.379945 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.379980 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 2 D0713 08:46:01.379998 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:01.380639 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.380665 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 3 D0713 08:46:01.380673 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:01.386998 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.387026 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 4 D0713 08:46:01.387037 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:01.388309 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.388362 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 5 D0713 08:46:01.388373 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:01.388427 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.388433 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 6 D0713 08:46:01.388438 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:01.388634 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.388652 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 7 D0713 08:46:01.388657 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:01.388809 352222 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.388829 352222 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00002b9e0 8 D0713 08:46:01.388836 352222 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:01.389037 352222 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.389075 352222 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00002b9e0 9 D0713 08:46:01.389090 352222 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:01.389211 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.389246 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 10 D0713 08:46:01.389259 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:01.397240 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.397283 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 11 D0713 08:46:01.397296 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:01.399872 352222 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.399899 352222 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00002b9e0 12 D0713 08:46:01.399916 352222 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:01.399962 352222 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.399998 352222 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc00002b9e0 13 D0713 08:46:01.400011 352222 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:01.400073 352222 task_signals.go:470] [ 1039: 1039] Notified of signal 23 D0713 08:46:01.400162 352222 task_signals.go:220] [ 1039: 1039] Signal 23: delivering to handler D0713 08:46:01.407064 352222 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.407099 352222 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc00002b9e0 14 D0713 08:46:01.407113 352222 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:01.407176 352222 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.407201 352222 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.407224 352222 task_signals.go:204] [ 1039: 1042] Signal 1039, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.407240 352222 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.407246 352222 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.407250 352222 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.407231 352222 task_signals.go:204] [ 1039: 1041] Signal 1039, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.407266 352222 task_signals.go:204] [ 1039: 1040] Signal 1039, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.407272 352222 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.407296 352222 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.407317 352222 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.407280 352222 task_signals.go:204] [ 1039: 1043] Signal 1039, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.407337 352222 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.407344 352222 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.407349 352222 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.407359 352222 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.409408 352222 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.409455 352222 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.409472 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.409519 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.409546 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.409596 352222 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.410409 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.412071 352222 syscalls.go:262] [ 1044: 1044] Allocating stack with size of 8388608 bytes D0713 08:46:01.412203 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.413862 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.413915 352222 usertrap_amd64.go:106] [ 1044: 1044] Map a usertrap vma at 60000 D0713 08:46:01.414033 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 1 D0713 08:46:01.414078 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:01.414535 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.414562 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 2 D0713 08:46:01.414575 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:01.415210 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.415230 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 3 D0713 08:46:01.415237 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:01.421397 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.421450 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 4 D0713 08:46:01.421466 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:01.422634 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.422660 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 5 D0713 08:46:01.422671 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:01.422726 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.422740 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 6 D0713 08:46:01.422747 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:01.423199 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.423215 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 7 D0713 08:46:01.423221 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:01.423383 352222 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.423395 352222 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc000fa08d0 8 D0713 08:46:01.423407 352222 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:01.423632 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.423668 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 9 D0713 08:46:01.423680 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:01.423701 352222 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.423706 352222 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc000fa08d0 10 D0713 08:46:01.423713 352222 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:01.431238 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.431282 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 11 D0713 08:46:01.431294 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:01.435044 352222 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.435092 352222 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc000fa08d0 12 D0713 08:46:01.435106 352222 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:01.435201 352222 usertrap_amd64.go:212] [ 1044: 1045] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.435255 352222 usertrap_amd64.go:122] [ 1044: 1045] Allocate a new trap: 0xc000fa08d0 13 D0713 08:46:01.435275 352222 usertrap_amd64.go:225] [ 1044: 1045] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:01.435378 352222 task_signals.go:470] [ 1044: 1044] Notified of signal 23 D0713 08:46:01.435494 352222 task_signals.go:220] [ 1044: 1044] Signal 23: delivering to handler I0713 08:46:01.442303 352222 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 08:46:01.442470 352222 usertrap_amd64.go:212] [ 1044: 1044] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.442496 352222 usertrap_amd64.go:122] [ 1044: 1044] Allocate a new trap: 0xc000fa08d0 14 D0713 08:46:01.442511 352222 usertrap_amd64.go:225] [ 1044: 1044] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:01.442583 352222 task_exit.go:204] [ 1044: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.442613 352222 task_exit.go:204] [ 1044: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.442638 352222 task_signals.go:204] [ 1044: 1046] Signal 1044, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.442672 352222 task_signals.go:204] [ 1044: 1048] Signal 1044, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.442659 352222 task_signals.go:204] [ 1044: 1045] Signal 1044, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.442655 352222 task_signals.go:204] [ 1044: 1047] Signal 1044, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.442685 352222 task_exit.go:204] [ 1044: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.442713 352222 task_exit.go:204] [ 1044: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.442729 352222 task_exit.go:204] [ 1044: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.442749 352222 task_exit.go:204] [ 1044: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.442757 352222 task_exit.go:204] [ 1044: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.442762 352222 task_exit.go:204] [ 1044: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.442776 352222 task_exit.go:204] [ 1044: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.442796 352222 task_exit.go:204] [ 1044: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.442801 352222 task_exit.go:204] [ 1044: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.442819 352222 task_exit.go:204] [ 1044: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.444392 352222 task_exit.go:204] [ 1044: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.444426 352222 task_exit.go:204] [ 1044: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.444445 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.444481 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.444499 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.444591 352222 task_exit.go:204] [ 1044: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.445382 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.447272 352222 syscalls.go:262] [ 1049: 1049] Allocating stack with size of 8388608 bytes D0713 08:46:01.447392 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.448632 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.448698 352222 usertrap_amd64.go:106] [ 1049: 1049] Map a usertrap vma at 67000 D0713 08:46:01.448816 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 1 D0713 08:46:01.448853 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:01.449349 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.449405 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 2 D0713 08:46:01.449422 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:01.450168 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.450193 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 3 D0713 08:46:01.450204 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:01.456561 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.456593 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 4 D0713 08:46:01.456616 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:01.457752 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.457775 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 5 D0713 08:46:01.457784 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:01.457845 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.457861 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 6 D0713 08:46:01.457867 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:01.458249 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.458265 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 7 D0713 08:46:01.458271 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:01.458435 352222 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.458455 352222 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc000c99350 8 D0713 08:46:01.458465 352222 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:01.458682 352222 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:01.458731 352222 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc000c99350 9 D0713 08:46:01.458748 352222 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:01.458776 352222 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.458790 352222 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc000c99350 10 D0713 08:46:01.458798 352222 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:01.458851 352222 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.458917 352222 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc000c99350 11 D0713 08:46:01.458936 352222 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:01.459376 352222 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 08:46:01.459566 352222 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.459591 352222 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc000c99350 12 D0713 08:46:01.459601 352222 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:01.459661 352222 usertrap_amd64.go:212] [ 1049: 1050] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.459683 352222 usertrap_amd64.go:122] [ 1049: 1050] Allocate a new trap: 0xc000c99350 13 D0713 08:46:01.459695 352222 usertrap_amd64.go:225] [ 1049: 1050] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:01.459761 352222 task_signals.go:470] [ 1049: 1049] Notified of signal 23 D0713 08:46:01.459794 352222 task_signals.go:220] [ 1049: 1049] Signal 23: delivering to handler D0713 08:46:01.466678 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.466738 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 14 D0713 08:46:01.466753 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46af29 trap addr 67460 ([184 37 1 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:01.469977 352222 task_signals.go:470] [ 1049: 1049] Notified of signal 23 D0713 08:46:01.470040 352222 task_signals.go:220] [ 1049: 1049] Signal 23: delivering to handler I0713 08:46:01.478378 352222 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 08:46:01.478484 352222 usertrap_amd64.go:212] [ 1049: 1049] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.478499 352222 usertrap_amd64.go:122] [ 1049: 1049] Allocate a new trap: 0xc000c99350 15 D0713 08:46:01.478513 352222 usertrap_amd64.go:225] [ 1049: 1049] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:46:01.478598 352222 task_exit.go:204] [ 1049: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.478621 352222 task_exit.go:204] [ 1049: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.478657 352222 task_signals.go:204] [ 1049: 1052] Signal 1049, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.478685 352222 task_exit.go:204] [ 1049: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.478692 352222 task_exit.go:204] [ 1049: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.478697 352222 task_exit.go:204] [ 1049: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.478686 352222 task_signals.go:204] [ 1049: 1050] Signal 1049, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.478643 352222 task_signals.go:204] [ 1049: 1051] Signal 1049, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.478715 352222 task_exit.go:204] [ 1049: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.478703 352222 task_signals.go:204] [ 1049: 1053] Signal 1049, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.478736 352222 task_exit.go:204] [ 1049: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.478759 352222 task_exit.go:204] [ 1049: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.478786 352222 task_exit.go:204] [ 1049: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.478809 352222 task_exit.go:204] [ 1049: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.478815 352222 task_exit.go:204] [ 1049: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.478837 352222 task_exit.go:204] [ 1049: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.480600 352222 task_exit.go:204] [ 1049: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.480636 352222 task_exit.go:204] [ 1049: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.480654 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.480687 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.480707 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.480861 352222 task_exit.go:204] [ 1049: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.481565 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.483112 352222 syscalls.go:262] [ 1054: 1054] Allocating stack with size of 8388608 bytes D0713 08:46:01.483243 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.484796 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.484845 352222 usertrap_amd64.go:106] [ 1054: 1054] Map a usertrap vma at 64000 D0713 08:46:01.485039 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 1 D0713 08:46:01.485082 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.485635 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.485658 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 2 D0713 08:46:01.485668 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.486413 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.486444 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 3 D0713 08:46:01.486458 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.493243 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.493297 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 4 D0713 08:46:01.493312 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.494626 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.494644 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 5 D0713 08:46:01.494652 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.494716 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.494741 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 6 D0713 08:46:01.494746 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.495421 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.495447 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 7 D0713 08:46:01.495460 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.495638 352222 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.495655 352222 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc001931b00 8 D0713 08:46:01.495665 352222 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.495939 352222 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.495960 352222 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc001931b00 9 D0713 08:46:01.495969 352222 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.496039 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.496060 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 10 D0713 08:46:01.496069 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.496625 352222 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.496650 352222 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc001931b00 11 D0713 08:46:01.496662 352222 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.496738 352222 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.496752 352222 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc001931b00 12 D0713 08:46:01.496761 352222 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.496780 352222 task_signals.go:470] [ 1054: 1054] Notified of signal 23 D0713 08:46:01.496858 352222 task_signals.go:220] [ 1054: 1054] Signal 23: delivering to handler D0713 08:46:01.504350 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.504375 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 13 D0713 08:46:01.504385 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.508147 352222 task_signals.go:470] [ 1054: 1054] Notified of signal 23 D0713 08:46:01.508181 352222 task_signals.go:220] [ 1054: 1054] Signal 23: delivering to handler I0713 08:46:01.514612 352222 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 08:46:01.514688 352222 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.514697 352222 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc001931b00 14 D0713 08:46:01.514716 352222 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.514764 352222 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.514780 352222 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.514798 352222 task_signals.go:204] [ 1054: 1055] Signal 1054, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.514811 352222 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.514818 352222 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.514823 352222 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.514809 352222 task_signals.go:204] [ 1054: 1057] Signal 1054, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.514837 352222 task_signals.go:204] [ 1054: 1056] Signal 1054, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.514839 352222 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.514841 352222 task_signals.go:204] [ 1054: 1058] Signal 1054, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.514855 352222 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.514870 352222 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.514882 352222 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.514898 352222 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.514902 352222 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.514910 352222 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.516387 352222 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.516417 352222 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.516437 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.516474 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.516481 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.516625 352222 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.517107 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.518541 352222 syscalls.go:262] [ 1059: 1059] Allocating stack with size of 8388608 bytes D0713 08:46:01.518639 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.519596 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.519619 352222 usertrap_amd64.go:106] [ 1059: 1059] Map a usertrap vma at 63000 D0713 08:46:01.519725 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 1 D0713 08:46:01.519751 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:01.520057 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.520083 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 2 D0713 08:46:01.520095 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:01.520535 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.520550 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 3 D0713 08:46:01.520557 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:01.526512 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.526536 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 4 D0713 08:46:01.526547 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:01.527538 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.527557 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 5 D0713 08:46:01.527565 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:01.527698 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.527714 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 6 D0713 08:46:01.527722 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:01.528443 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.528465 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 7 D0713 08:46:01.528474 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:01.528580 352222 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.528595 352222 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0005cd9e0 8 D0713 08:46:01.528602 352222 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:01.528771 352222 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.528804 352222 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0005cd9e0 9 D0713 08:46:01.528818 352222 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:01.528867 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.528885 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 10 D0713 08:46:01.528897 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:01.536372 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.536385 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 11 D0713 08:46:01.536394 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:01.540204 352222 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.540226 352222 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0005cd9e0 12 D0713 08:46:01.540238 352222 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:01.540271 352222 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.540290 352222 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc0005cd9e0 13 D0713 08:46:01.540302 352222 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:01.540361 352222 task_signals.go:470] [ 1059: 1059] Notified of signal 23 D0713 08:46:01.540435 352222 task_signals.go:220] [ 1059: 1059] Signal 23: delivering to handler I0713 08:46:01.546301 352222 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 08:46:01.546407 352222 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.546422 352222 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc0005cd9e0 14 D0713 08:46:01.546430 352222 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:01.546453 352222 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.546462 352222 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.546482 352222 task_signals.go:204] [ 1059: 1060] Signal 1059, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.546487 352222 task_signals.go:204] [ 1059: 1062] Signal 1059, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.546497 352222 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.546513 352222 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.546517 352222 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.546526 352222 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.546532 352222 task_signals.go:204] [ 1059: 1063] Signal 1059, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.546541 352222 task_signals.go:204] [ 1059: 1061] Signal 1059, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.546556 352222 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.546563 352222 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.546569 352222 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.546574 352222 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.546578 352222 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.546584 352222 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.548087 352222 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.548108 352222 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.548116 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.548142 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.548153 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.548260 352222 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.548666 352222 task_stop.go:118] [ 5: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.550029 352222 syscalls.go:262] [ 1064: 1064] Allocating stack with size of 8388608 bytes D0713 08:46:01.550106 352222 task_stop.go:138] [ 5: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.551427 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.551460 352222 usertrap_amd64.go:106] [ 1064: 1064] Map a usertrap vma at 6a000 D0713 08:46:01.551522 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 1 D0713 08:46:01.551547 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:01.551857 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.551882 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 2 D0713 08:46:01.551894 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:01.552371 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.552395 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 3 D0713 08:46:01.552404 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:01.557810 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.557834 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 4 D0713 08:46:01.557842 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:01.559173 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.559192 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 5 D0713 08:46:01.559200 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:01.559260 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.559273 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 6 D0713 08:46:01.559280 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:01.559732 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.559749 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 7 D0713 08:46:01.559756 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:01.559820 352222 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.559837 352222 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc00002bd10 8 D0713 08:46:01.559844 352222 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:01.560037 352222 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.560068 352222 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc00002bd10 9 D0713 08:46:01.560081 352222 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:01.560145 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.560161 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 10 D0713 08:46:01.560171 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:01.560618 352222 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.560645 352222 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc00002bd10 11 D0713 08:46:01.560656 352222 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:01.560758 352222 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.560780 352222 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc00002bd10 12 D0713 08:46:01.560859 352222 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:01.560915 352222 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 08:46:01.560961 352222 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 08:46:01.568049 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.568072 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 13 D0713 08:46:01.568081 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:01.571999 352222 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 08:46:01.572696 352222 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 08:46:01.578624 352222 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.578650 352222 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc00002bd10 14 D0713 08:46:01.578660 352222 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:01.578716 352222 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.578733 352222 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.578755 352222 task_signals.go:204] [ 1064: 1067] Signal 1064, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.578779 352222 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.578751 352222 task_signals.go:204] [ 1064: 1066] Signal 1064, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.578790 352222 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.578774 352222 task_signals.go:204] [ 1064: 1065] Signal 1064, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.578795 352222 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.578810 352222 task_signals.go:204] [ 1064: 1068] Signal 1064, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.578829 352222 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.578835 352222 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.578838 352222 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.578844 352222 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.578850 352222 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.578853 352222 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.578861 352222 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.580287 352222 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.580305 352222 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.580323 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.580373 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.580393 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.580439 352222 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.580994 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.583086 352222 syscalls.go:262] [ 1069: 1069] Allocating stack with size of 8388608 bytes D0713 08:46:01.583295 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.584425 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.584459 352222 usertrap_amd64.go:106] [ 1069: 1069] Map a usertrap vma at 6a000 D0713 08:46:01.584526 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 1 D0713 08:46:01.584545 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:01.584834 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.584852 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 2 D0713 08:46:01.584860 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:01.585598 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.585622 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 3 D0713 08:46:01.585631 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:01.591317 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.591344 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 4 D0713 08:46:01.591354 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:01.592544 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.592564 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 5 D0713 08:46:01.592575 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:01.592647 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.592653 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 6 D0713 08:46:01.592659 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:01.593255 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.593283 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 7 D0713 08:46:01.593294 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:01.593461 352222 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.593486 352222 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc0005cdce0 8 D0713 08:46:01.593497 352222 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:01.593712 352222 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.593733 352222 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc0005cdce0 9 D0713 08:46:01.593742 352222 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:01.593819 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.593835 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 10 D0713 08:46:01.593843 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:01.601943 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.601972 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 11 D0713 08:46:01.601983 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:01.604811 352222 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.604827 352222 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc0005cdce0 12 D0713 08:46:01.604838 352222 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:01.604861 352222 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.604868 352222 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc0005cdce0 13 D0713 08:46:01.604875 352222 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:01.604936 352222 task_signals.go:470] [ 1069: 1069] Notified of signal 23 D0713 08:46:01.605107 352222 task_signals.go:220] [ 1069: 1069] Signal 23: delivering to handler D0713 08:46:01.612412 352222 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.612427 352222 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc0005cdce0 14 D0713 08:46:01.612437 352222 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:01.612545 352222 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.612560 352222 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.612590 352222 task_signals.go:204] [ 1069: 1070] Signal 1069, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.612603 352222 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.612620 352222 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.612624 352222 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.612599 352222 task_signals.go:204] [ 1069: 1072] Signal 1069, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.612639 352222 task_signals.go:204] [ 1069: 1071] Signal 1069, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.612656 352222 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.612662 352222 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.612668 352222 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.612664 352222 task_signals.go:204] [ 1069: 1073] Signal 1069, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.612717 352222 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.612751 352222 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.612766 352222 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.612778 352222 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.614144 352222 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.614177 352222 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.614202 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.614235 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.614248 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.614304 352222 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.614851 352222 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.616330 352222 syscalls.go:262] [ 1074: 1074] Allocating stack with size of 8388608 bytes D0713 08:46:01.616432 352222 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.617589 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.617624 352222 usertrap_amd64.go:106] [ 1074: 1074] Map a usertrap vma at 69000 D0713 08:46:01.617683 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 1 D0713 08:46:01.617701 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:46:01.618204 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.618227 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 2 D0713 08:46:01.618235 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:46:01.618676 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.618694 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 3 D0713 08:46:01.618702 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:46:01.624335 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.624360 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 4 D0713 08:46:01.624370 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:46:01.625639 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.625702 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 5 D0713 08:46:01.625722 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:46:01.625794 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.625801 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 6 D0713 08:46:01.625808 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:46:01.626250 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.626270 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 7 D0713 08:46:01.626278 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:46:01.626491 352222 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.626526 352222 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc0009c4150 8 D0713 08:46:01.626540 352222 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:46:01.626830 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.626854 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 9 D0713 08:46:01.626866 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:46:01.626879 352222 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.626884 352222 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc0009c4150 10 D0713 08:46:01.626890 352222 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:46:01.635265 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.635294 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 11 D0713 08:46:01.635307 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:46:01.638116 352222 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.638147 352222 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc0009c4150 12 D0713 08:46:01.638163 352222 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:46:01.638260 352222 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.638277 352222 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc0009c4150 13 D0713 08:46:01.638289 352222 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:46:01.638355 352222 task_signals.go:470] [ 1074: 1074] Notified of signal 23 D0713 08:46:01.638441 352222 task_signals.go:220] [ 1074: 1074] Signal 23: delivering to handler D0713 08:46:01.645901 352222 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.645937 352222 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc0009c4150 14 D0713 08:46:01.645948 352222 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:46:01.646020 352222 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.646058 352222 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.646080 352222 task_signals.go:204] [ 1074: 1077] Signal 1074, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.646080 352222 task_signals.go:204] [ 1074: 1076] Signal 1074, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.646095 352222 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.646110 352222 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.646127 352222 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.646134 352222 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.646152 352222 task_signals.go:204] [ 1074: 1075] Signal 1074, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.646171 352222 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.646183 352222 task_signals.go:204] [ 1074: 1078] Signal 1074, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.646200 352222 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.646212 352222 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.646230 352222 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.646239 352222 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.646249 352222 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.647976 352222 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.648009 352222 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.648023 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.648052 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.648064 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.648145 352222 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.648328 352222 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:46:01.648372 352222 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:46:01.648812 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.650477 352222 syscalls.go:262] [ 1079: 1079] Allocating stack with size of 8388608 bytes D0713 08:46:01.650573 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.652132 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.652202 352222 usertrap_amd64.go:106] [ 1079: 1079] Map a usertrap vma at 64000 D0713 08:46:01.652318 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 1 D0713 08:46:01.652348 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.652865 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.652889 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 2 D0713 08:46:01.652903 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.653705 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.653729 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 3 D0713 08:46:01.653744 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.660099 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.660153 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 4 D0713 08:46:01.660169 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.661322 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.661348 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 5 D0713 08:46:01.661367 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.661482 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.661498 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 6 D0713 08:46:01.661505 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.662006 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.662042 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 7 D0713 08:46:01.662054 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.662233 352222 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.662246 352222 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc001931f20 8 D0713 08:46:01.662261 352222 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.662345 352222 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.662358 352222 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc001931f20 9 D0713 08:46:01.662367 352222 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.662568 352222 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.662601 352222 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc001931f20 10 D0713 08:46:01.662610 352222 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b020 trap addr 64320 ([184 39 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.662692 352222 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.662724 352222 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc001931f20 11 D0713 08:46:01.662743 352222 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b04f trap addr 64370 ([184 234 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.662784 352222 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 08:46:01.662873 352222 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 08:46:01.663079 352222 task_signals.go:481] [ 1079: 1079] No task notified of signal 23 D0713 08:46:01.663154 352222 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 08:46:01.663222 352222 usertrap_amd64.go:212] [ 1079: 1082] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.663235 352222 usertrap_amd64.go:122] [ 1079: 1082] Allocate a new trap: 0xc001931f20 12 D0713 08:46:01.663244 352222 usertrap_amd64.go:225] [ 1079: 1082] Apply the binary patch addr 46b57c trap addr 643c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.670477 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.670508 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 13 D0713 08:46:01.670520 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.673566 352222 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 08:46:01.673622 352222 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 08:46:01.681836 352222 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.681889 352222 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc001931f20 14 D0713 08:46:01.681906 352222 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.682014 352222 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.682047 352222 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.682066 352222 task_signals.go:204] [ 1079: 1081] Signal 1079, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.682100 352222 task_signals.go:204] [ 1079: 1083] Signal 1079, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.682115 352222 task_signals.go:204] [ 1079: 1082] Signal 1079, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.682122 352222 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.682155 352222 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.682175 352222 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.682093 352222 task_signals.go:204] [ 1079: 1084] Signal 1079, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.682198 352222 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.682210 352222 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.682233 352222 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.682250 352222 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.682285 352222 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.682296 352222 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.682300 352222 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.682318 352222 task_signals.go:204] [ 1079: 1080] Signal 1079, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.682316 352222 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.682390 352222 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.682422 352222 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.683971 352222 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.683997 352222 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.684011 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.684042 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.684051 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.684182 352222 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.684803 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.686453 352222 syscalls.go:262] [ 1085: 1085] Allocating stack with size of 8388608 bytes D0713 08:46:01.686628 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.688644 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.688702 352222 usertrap_amd64.go:106] [ 1085: 1085] Map a usertrap vma at 64000 D0713 08:46:01.688825 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 1 D0713 08:46:01.688852 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.689424 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.689449 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 2 D0713 08:46:01.689460 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.690196 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.690221 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 3 D0713 08:46:01.690232 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.696859 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.696887 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 4 D0713 08:46:01.696898 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.698179 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.698192 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 5 D0713 08:46:01.698200 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.698226 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.698231 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 6 D0713 08:46:01.698236 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.698596 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.698613 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 7 D0713 08:46:01.698621 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.698784 352222 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.698809 352222 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000c99aa0 8 D0713 08:46:01.698827 352222 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.699008 352222 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.699040 352222 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000c99aa0 9 D0713 08:46:01.699055 352222 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.699255 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.699285 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 10 D0713 08:46:01.699296 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.707178 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.707207 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 11 D0713 08:46:01.707217 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.709935 352222 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.709993 352222 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000c99aa0 12 D0713 08:46:01.710011 352222 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.710072 352222 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.710081 352222 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000c99aa0 13 D0713 08:46:01.710088 352222 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.710109 352222 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0713 08:46:01.710205 352222 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0713 08:46:01.717836 352222 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.717865 352222 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000c99aa0 14 D0713 08:46:01.717876 352222 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.718022 352222 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.718065 352222 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.718070 352222 task_signals.go:204] [ 1085: 1088] Signal 1085, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.718089 352222 task_signals.go:204] [ 1085: 1087] Signal 1085, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.718093 352222 task_signals.go:204] [ 1085: 1089] Signal 1085, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.718107 352222 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.718135 352222 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.718148 352222 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.718172 352222 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.718201 352222 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.718209 352222 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.718241 352222 task_signals.go:204] [ 1085: 1086] Signal 1085, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.718273 352222 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.718311 352222 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.718330 352222 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.718349 352222 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.719972 352222 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.720015 352222 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.720032 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.720062 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.720085 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.720216 352222 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.721076 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.722628 352222 syscalls.go:262] [ 1090: 1090] Allocating stack with size of 8388608 bytes D0713 08:46:01.722740 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.724047 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.724090 352222 usertrap_amd64.go:106] [ 1090: 1090] Map a usertrap vma at 60000 D0713 08:46:01.724198 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 1 D0713 08:46:01.724222 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:01.724745 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.724783 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 2 D0713 08:46:01.724802 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:01.725745 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.725757 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 3 D0713 08:46:01.725768 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:01.731406 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.731442 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 4 D0713 08:46:01.731455 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:01.732465 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.732491 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 5 D0713 08:46:01.732501 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:01.732556 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.732575 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 6 D0713 08:46:01.732580 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:01.732806 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.732824 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 7 D0713 08:46:01.732832 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:01.733039 352222 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.733090 352222 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000c99b30 8 D0713 08:46:01.733101 352222 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:01.733346 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.733380 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 9 D0713 08:46:01.733461 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:01.733494 352222 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.733503 352222 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000c99b30 10 D0713 08:46:01.733524 352222 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:01.741650 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.741691 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 11 D0713 08:46:01.741705 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:01.744368 352222 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.744408 352222 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000c99b30 12 D0713 08:46:01.744421 352222 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:01.744471 352222 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.744483 352222 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000c99b30 13 D0713 08:46:01.744489 352222 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:01.744506 352222 task_signals.go:470] [ 1090: 1090] Notified of signal 23 D0713 08:46:01.744589 352222 task_signals.go:220] [ 1090: 1090] Signal 23: delivering to handler I0713 08:46:01.752930 352222 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 08:46:01.753045 352222 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.753060 352222 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000c99b30 14 D0713 08:46:01.753078 352222 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:01.753149 352222 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.753169 352222 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.753192 352222 task_signals.go:204] [ 1090: 1092] Signal 1090, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.753203 352222 task_signals.go:204] [ 1090: 1093] Signal 1090, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.753226 352222 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.753283 352222 task_signals.go:204] [ 1090: 1094] Signal 1090, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.753310 352222 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.753322 352222 task_signals.go:204] [ 1090: 1091] Signal 1090, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.753340 352222 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.753346 352222 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.753361 352222 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.753379 352222 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.753389 352222 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.753401 352222 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.753407 352222 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.753434 352222 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.755174 352222 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.755214 352222 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.755236 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.755273 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.755299 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.755468 352222 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.756204 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.757661 352222 syscalls.go:262] [ 1095: 1095] Allocating stack with size of 8388608 bytes D0713 08:46:01.757781 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.758900 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.758942 352222 usertrap_amd64.go:106] [ 1095: 1095] Map a usertrap vma at 65000 D0713 08:46:01.759041 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 1 D0713 08:46:01.759070 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:46:01.759357 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.759381 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 2 D0713 08:46:01.759392 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:46:01.760099 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.760127 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 3 D0713 08:46:01.760137 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:46:01.766865 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.766894 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 4 D0713 08:46:01.766904 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:46:01.768057 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.768079 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 5 D0713 08:46:01.768086 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:46:01.768144 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.768161 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 6 D0713 08:46:01.768171 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:46:01.768479 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.768498 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 7 D0713 08:46:01.768506 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:46:01.768649 352222 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.768681 352222 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc002c1e000 8 D0713 08:46:01.768696 352222 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:46:01.768926 352222 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.769013 352222 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc002c1e000 9 D0713 08:46:01.769035 352222 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:46:01.769057 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.769076 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 10 D0713 08:46:01.769084 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:46:01.778215 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.778241 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 11 D0713 08:46:01.778251 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:46:01.781994 352222 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.782058 352222 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc002c1e000 12 D0713 08:46:01.782079 352222 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:46:01.782180 352222 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.782199 352222 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc002c1e000 13 D0713 08:46:01.782210 352222 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:46:01.782289 352222 task_signals.go:470] [ 1095: 1095] Notified of signal 23 D0713 08:46:01.782383 352222 task_signals.go:220] [ 1095: 1095] Signal 23: delivering to handler I0713 08:46:01.790000 352222 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 08:46:01.790117 352222 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.790146 352222 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc002c1e000 14 D0713 08:46:01.790168 352222 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:46:01.790254 352222 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.790305 352222 task_signals.go:204] [ 1095: 1097] Signal 1095, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.790334 352222 task_signals.go:204] [ 1095: 1096] Signal 1095, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.790355 352222 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.790432 352222 task_signals.go:204] [ 1095: 1098] Signal 1095, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.790459 352222 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.790431 352222 task_signals.go:204] [ 1095: 1099] Signal 1095, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.790480 352222 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.790505 352222 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.790525 352222 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.790552 352222 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.790562 352222 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.790576 352222 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.790586 352222 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.790603 352222 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.790619 352222 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.792256 352222 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.792290 352222 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.792309 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.792350 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.792388 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.792371 352222 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.793119 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.794714 352222 syscalls.go:262] [ 1100: 1100] Allocating stack with size of 8388608 bytes D0713 08:46:01.794822 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.796195 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.796235 352222 usertrap_amd64.go:106] [ 1100: 1100] Map a usertrap vma at 64000 D0713 08:46:01.796336 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 1 D0713 08:46:01.796371 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.796779 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.796797 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 2 D0713 08:46:01.796805 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.797664 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.797695 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 3 D0713 08:46:01.797703 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.803528 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.803560 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 4 D0713 08:46:01.803570 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.804828 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.804850 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 5 D0713 08:46:01.804858 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.804895 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.804906 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 6 D0713 08:46:01.804913 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.805386 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.805403 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 7 D0713 08:46:01.805410 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.805537 352222 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.805553 352222 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0009c4990 8 D0713 08:46:01.805559 352222 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.805708 352222 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.805751 352222 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0009c4990 9 D0713 08:46:01.805765 352222 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.805812 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.805840 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 10 D0713 08:46:01.805852 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.806106 352222 usertrap_amd64.go:212] [ 1100: 1103] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:01.806133 352222 usertrap_amd64.go:122] [ 1100: 1103] Allocate a new trap: 0xc0009c4990 11 D0713 08:46:01.806144 352222 usertrap_amd64.go:225] [ 1100: 1103] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.814913 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.814948 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 12 D0713 08:46:01.814961 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.818021 352222 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.818042 352222 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0009c4990 13 D0713 08:46:01.818054 352222 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.818074 352222 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.818081 352222 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0009c4990 14 D0713 08:46:01.818087 352222 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.818152 352222 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0713 08:46:01.818248 352222 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler D0713 08:46:01.826693 352222 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.826723 352222 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0009c4990 15 D0713 08:46:01.826734 352222 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:46:01.826789 352222 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.826807 352222 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.826836 352222 task_signals.go:204] [ 1100: 1104] Signal 1100, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.826836 352222 task_signals.go:204] [ 1100: 1102] Signal 1100, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.826853 352222 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.826860 352222 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.826868 352222 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.826880 352222 task_signals.go:204] [ 1100: 1101] Signal 1100, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.826889 352222 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.826882 352222 task_signals.go:204] [ 1100: 1103] Signal 1100, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.826894 352222 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.826918 352222 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.826932 352222 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.826941 352222 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.826947 352222 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.826958 352222 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.828633 352222 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.828666 352222 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.828683 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.828721 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.828740 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.828846 352222 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.828913 352222 task_signals.go:470] [ 5: 13] Notified of signal 23 D0713 08:46:01.829079 352222 task_signals.go:220] [ 5: 13] Signal 23: delivering to handler D0713 08:46:01.829937 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.831235 352222 syscalls.go:262] [ 1105: 1105] Allocating stack with size of 8388608 bytes D0713 08:46:01.831331 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.832723 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.832793 352222 usertrap_amd64.go:106] [ 1105: 1105] Map a usertrap vma at 63000 D0713 08:46:01.832966 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 1 D0713 08:46:01.833027 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:01.833533 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.833561 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 2 D0713 08:46:01.833573 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:01.834339 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.834374 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 3 D0713 08:46:01.834387 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:01.840614 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.840648 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 4 D0713 08:46:01.840659 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:01.842083 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.842109 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 5 D0713 08:46:01.842121 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:01.842189 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.842208 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 6 D0713 08:46:01.842216 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:01.842774 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.842797 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 7 D0713 08:46:01.842806 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:01.842990 352222 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.843020 352222 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0009c4a50 8 D0713 08:46:01.843033 352222 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:01.843256 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.843280 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 9 D0713 08:46:01.843290 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:01.843358 352222 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.843381 352222 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0009c4a50 10 D0713 08:46:01.843391 352222 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:01.851771 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.851819 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 11 D0713 08:46:01.851837 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:01.854893 352222 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.854931 352222 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0009c4a50 12 D0713 08:46:01.854944 352222 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:01.854990 352222 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.855011 352222 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0009c4a50 13 D0713 08:46:01.855023 352222 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:01.855081 352222 task_signals.go:470] [ 1105: 1105] Notified of signal 23 D0713 08:46:01.855192 352222 task_signals.go:220] [ 1105: 1105] Signal 23: delivering to handler D0713 08:46:01.862590 352222 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.862618 352222 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0009c4a50 14 D0713 08:46:01.862629 352222 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:01.862706 352222 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.862729 352222 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.862771 352222 task_signals.go:204] [ 1105: 1110] Signal 1105, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.862770 352222 task_signals.go:204] [ 1105: 1107] Signal 1105, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.862803 352222 task_exit.go:204] [ 1105: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.862836 352222 task_exit.go:204] [ 1105: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.862855 352222 task_exit.go:204] [ 1105: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.862781 352222 task_signals.go:204] [ 1105: 1106] Signal 1105, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.862881 352222 task_signals.go:204] [ 1105: 1108] Signal 1105, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.862895 352222 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.862910 352222 task_signals.go:204] [ 1105: 1109] Signal 1105, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.862931 352222 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.862947 352222 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.862953 352222 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.862967 352222 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.862975 352222 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.862980 352222 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.862992 352222 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.863011 352222 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.863025 352222 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.865171 352222 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.865202 352222 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.865217 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.865280 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.865291 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.865461 352222 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.866176 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.867489 352222 syscalls.go:262] [ 1111: 1111] Allocating stack with size of 8388608 bytes D0713 08:46:01.867590 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.868802 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.868840 352222 usertrap_amd64.go:106] [ 1111: 1111] Map a usertrap vma at 66000 D0713 08:46:01.868917 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 1 D0713 08:46:01.868967 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:01.869336 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.869354 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 2 D0713 08:46:01.869362 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:01.869824 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.869844 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 3 D0713 08:46:01.869852 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:01.875394 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.875416 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 4 D0713 08:46:01.875425 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:01.876661 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.876676 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 5 D0713 08:46:01.876685 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:01.876702 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.876706 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 6 D0713 08:46:01.876711 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:01.877356 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.877373 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 7 D0713 08:46:01.877383 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:01.877463 352222 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.877470 352222 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc002c1e270 8 D0713 08:46:01.877477 352222 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:01.877650 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.877692 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 9 D0713 08:46:01.877708 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:01.877788 352222 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.877796 352222 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc002c1e270 10 D0713 08:46:01.877882 352222 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:01.885257 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.885287 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 11 D0713 08:46:01.885299 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:01.888388 352222 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.888423 352222 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc002c1e270 12 D0713 08:46:01.888436 352222 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:01.888524 352222 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.888592 352222 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc002c1e270 13 D0713 08:46:01.888613 352222 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:01.888749 352222 task_signals.go:470] [ 1111: 1111] Notified of signal 23 D0713 08:46:01.888846 352222 task_signals.go:220] [ 1111: 1111] Signal 23: delivering to handler D0713 08:46:01.896224 352222 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.896256 352222 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc002c1e270 14 D0713 08:46:01.896269 352222 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:01.896337 352222 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.896360 352222 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.896386 352222 task_signals.go:204] [ 1111: 1114] Signal 1111, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.896409 352222 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.896385 352222 task_signals.go:204] [ 1111: 1113] Signal 1111, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.896419 352222 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.896447 352222 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.896515 352222 task_signals.go:204] [ 1111: 1115] Signal 1111, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.896512 352222 task_signals.go:204] [ 1111: 1112] Signal 1111, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.896530 352222 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.896542 352222 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.896554 352222 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.896626 352222 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.896663 352222 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.896680 352222 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.896686 352222 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.898239 352222 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.898278 352222 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.898296 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.898334 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.898342 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.898426 352222 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.899055 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.900620 352222 syscalls.go:262] [ 1116: 1116] Allocating stack with size of 8388608 bytes D0713 08:46:01.900758 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.902085 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.902128 352222 usertrap_amd64.go:106] [ 1116: 1116] Map a usertrap vma at 64000 D0713 08:46:01.902232 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 1 D0713 08:46:01.902268 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:46:01.902705 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.902730 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 2 D0713 08:46:01.902740 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:46:01.903553 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.903579 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 3 D0713 08:46:01.903593 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:46:01.910430 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.910463 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 4 D0713 08:46:01.910477 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:46:01.911774 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.911835 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 5 D0713 08:46:01.911851 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:46:01.911956 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.911970 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 6 D0713 08:46:01.911979 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:46:01.912452 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.912470 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 7 D0713 08:46:01.912479 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:46:01.912690 352222 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.912706 352222 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc002e2a030 8 D0713 08:46:01.912714 352222 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:46:01.912902 352222 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.912961 352222 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc002e2a030 9 D0713 08:46:01.912982 352222 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:46:01.913275 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.913332 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 10 D0713 08:46:01.913351 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:46:01.922143 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.922184 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 11 D0713 08:46:01.922195 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:46:01.925388 352222 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.925427 352222 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc002e2a030 12 D0713 08:46:01.925444 352222 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:46:01.925518 352222 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.925532 352222 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc002e2a030 13 D0713 08:46:01.925539 352222 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:46:01.925564 352222 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0713 08:46:01.925611 352222 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0713 08:46:01.934602 352222 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.934680 352222 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc002e2a030 14 D0713 08:46:01.934698 352222 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:46:01.934788 352222 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.934827 352222 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.934847 352222 task_signals.go:204] [ 1116: 1117] Signal 1116, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.934863 352222 task_signals.go:204] [ 1116: 1120] Signal 1116, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.934885 352222 task_signals.go:204] [ 1116: 1121] Signal 1116, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.934887 352222 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.934919 352222 task_signals.go:204] [ 1116: 1118] Signal 1116, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.934942 352222 task_signals.go:204] [ 1116: 1119] Signal 1116, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.934957 352222 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.934963 352222 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.934990 352222 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.935000 352222 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.935006 352222 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.935018 352222 task_exit.go:204] [ 1116: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.935038 352222 task_exit.go:204] [ 1116: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.935044 352222 task_exit.go:204] [ 1116: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.935054 352222 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.935061 352222 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.935067 352222 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.935079 352222 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.936998 352222 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.937042 352222 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.937057 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.937119 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.937154 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.937300 352222 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.938083 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.939545 352222 syscalls.go:262] [ 1122: 1122] Allocating stack with size of 8388608 bytes D0713 08:46:01.939682 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.941206 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.941252 352222 usertrap_amd64.go:106] [ 1122: 1122] Map a usertrap vma at 62000 D0713 08:46:01.941348 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 1 D0713 08:46:01.941384 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:46:01.941902 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.941952 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 2 D0713 08:46:01.941969 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:46:01.942971 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.943004 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 3 D0713 08:46:01.943019 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:46:01.951549 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.951609 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 4 D0713 08:46:01.951625 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:46:01.953299 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.953342 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 5 D0713 08:46:01.953355 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:46:01.953434 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.953453 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 6 D0713 08:46:01.953462 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:46:01.953973 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.953988 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 7 D0713 08:46:01.953995 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:46:01.954204 352222 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.954235 352222 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc002e2a0c0 8 D0713 08:46:01.954245 352222 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:46:01.954497 352222 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.954524 352222 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc002e2a0c0 9 D0713 08:46:01.954536 352222 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:46:01.954550 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.954558 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 10 D0713 08:46:01.954566 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:46:01.955125 352222 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46b020:sysno 39 D0713 08:46:01.955189 352222 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc002e2a0c0 11 D0713 08:46:01.955209 352222 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:46:01.955255 352222 usertrap_amd64.go:212] [ 1122: 1123] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:01.955288 352222 usertrap_amd64.go:122] [ 1122: 1123] Allocate a new trap: 0xc002e2a0c0 12 D0713 08:46:01.955307 352222 usertrap_amd64.go:225] [ 1122: 1123] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:46:01.955385 352222 task_signals.go:470] [ 1122: 1122] Notified of signal 23 D0713 08:46:01.955436 352222 task_signals.go:220] [ 1122: 1122] Signal 23: delivering to handler D0713 08:46:01.963088 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46af29:sysno 293 D0713 08:46:01.963136 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 13 D0713 08:46:01.963149 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:46:01.966039 352222 task_signals.go:470] [ 1122: 1122] Notified of signal 23 D0713 08:46:01.966112 352222 task_signals.go:220] [ 1122: 1122] Signal 23: delivering to handler D0713 08:46:01.974606 352222 usertrap_amd64.go:212] [ 1122: 1122] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:01.974664 352222 usertrap_amd64.go:122] [ 1122: 1122] Allocate a new trap: 0xc002e2a0c0 14 D0713 08:46:01.974681 352222 usertrap_amd64.go:225] [ 1122: 1122] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:46:01.974772 352222 task_exit.go:204] [ 1122: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.974803 352222 task_exit.go:204] [ 1122: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.974840 352222 task_signals.go:204] [ 1122: 1124] Signal 1122, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.974856 352222 task_exit.go:204] [ 1122: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.974841 352222 task_signals.go:204] [ 1122: 1123] Signal 1122, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.974864 352222 task_exit.go:204] [ 1122: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.974921 352222 task_exit.go:204] [ 1122: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.975016 352222 task_signals.go:204] [ 1122: 1126] Signal 1122, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.975047 352222 task_exit.go:204] [ 1122: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.975064 352222 task_exit.go:204] [ 1122: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.975049 352222 task_signals.go:204] [ 1122: 1125] Signal 1122, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:01.975084 352222 task_exit.go:204] [ 1122: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.975116 352222 task_exit.go:204] [ 1122: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.975157 352222 task_exit.go:204] [ 1122: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.975179 352222 task_exit.go:204] [ 1122: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.975191 352222 task_exit.go:204] [ 1122: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:01.977143 352222 task_exit.go:204] [ 1122: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:01.977183 352222 task_exit.go:204] [ 1122: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.977207 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:01.977242 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:01.977252 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:01.977431 352222 task_exit.go:204] [ 1122: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:01.978113 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.979944 352222 syscalls.go:262] [ 1127: 1127] Allocating stack with size of 8388608 bytes D0713 08:46:01.980524 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:01.984710 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:01.984760 352222 usertrap_amd64.go:106] [ 1127: 1127] Map a usertrap vma at 61000 D0713 08:46:01.984863 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 1 D0713 08:46:01.984902 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:46:01.985686 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:01.985744 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 2 D0713 08:46:01.985765 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:46:01.986664 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:01.986706 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 3 D0713 08:46:01.986725 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:46:01.994517 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:01.994593 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 4 D0713 08:46:01.994618 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:46:01.995845 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:01.995875 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 5 D0713 08:46:01.995889 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:46:01.995977 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b214:sysno 13 D0713 08:46:01.995987 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 6 D0713 08:46:01.995996 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:46:01.996262 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:01.996285 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 7 D0713 08:46:01.996297 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:46:01.996613 352222 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:01.996658 352222 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc002d601b0 8 D0713 08:46:01.996676 352222 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:46:01.997025 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:01.997058 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 9 D0713 08:46:01.997073 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:46:01.997142 352222 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46af76:sysno 35 D0713 08:46:01.997171 352222 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc002d601b0 10 D0713 08:46:01.997183 352222 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:46:02.005275 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.005316 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 11 D0713 08:46:02.005333 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:46:02.007711 352222 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.007798 352222 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc002d601b0 12 D0713 08:46:02.007829 352222 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:46:02.008000 352222 usertrap_amd64.go:212] [ 1127: 1128] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.008026 352222 usertrap_amd64.go:122] [ 1127: 1128] Allocate a new trap: 0xc002d601b0 13 D0713 08:46:02.008039 352222 usertrap_amd64.go:225] [ 1127: 1128] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:46:02.008148 352222 task_signals.go:470] [ 1127: 1127] Notified of signal 23 D0713 08:46:02.008249 352222 task_signals.go:220] [ 1127: 1127] Signal 23: delivering to handler D0713 08:46:02.015146 352222 usertrap_amd64.go:212] [ 1127: 1127] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.015183 352222 usertrap_amd64.go:122] [ 1127: 1127] Allocate a new trap: 0xc002d601b0 14 D0713 08:46:02.015197 352222 usertrap_amd64.go:225] [ 1127: 1127] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:46:02.015292 352222 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.015333 352222 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.015358 352222 task_signals.go:204] [ 1127: 1129] Signal 1127, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.015374 352222 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.015353 352222 task_signals.go:204] [ 1127: 1130] Signal 1127, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.015396 352222 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.015400 352222 task_signals.go:204] [ 1127: 1131] Signal 1127, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.015413 352222 task_exit.go:204] [ 1127: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.015380 352222 task_signals.go:204] [ 1127: 1128] Signal 1127, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.015446 352222 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.015456 352222 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.015461 352222 task_exit.go:204] [ 1127: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.015469 352222 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.015481 352222 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.015484 352222 task_exit.go:204] [ 1127: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.015496 352222 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.016782 352222 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.016793 352222 task_exit.go:204] [ 1127: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.016804 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.016848 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.016855 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.016995 352222 task_exit.go:204] [ 1127: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.017519 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.018918 352222 syscalls.go:262] [ 1132: 1132] Allocating stack with size of 8388608 bytes D0713 08:46:02.019007 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.020319 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.020360 352222 usertrap_amd64.go:106] [ 1132: 1132] Map a usertrap vma at 6a000 D0713 08:46:02.020483 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 1 D0713 08:46:02.020505 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:02.020998 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.021022 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 2 D0713 08:46:02.021032 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:02.021535 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.021558 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 3 D0713 08:46:02.021569 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:02.027414 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.027438 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 4 D0713 08:46:02.027446 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:02.028606 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.028629 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 5 D0713 08:46:02.028636 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:02.028684 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.028700 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 6 D0713 08:46:02.028709 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:02.028970 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.028984 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 7 D0713 08:46:02.028990 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:02.029120 352222 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.029142 352222 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc002e2a1b0 8 D0713 08:46:02.029151 352222 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:02.029335 352222 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.029387 352222 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc002e2a1b0 9 D0713 08:46:02.029405 352222 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:02.029469 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.029486 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 10 D0713 08:46:02.029500 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:02.030152 352222 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.030173 352222 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc002e2a1b0 11 D0713 08:46:02.030183 352222 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:02.030204 352222 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.030223 352222 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc002e2a1b0 12 D0713 08:46:02.030238 352222 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:02.030307 352222 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0713 08:46:02.030353 352222 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler D0713 08:46:02.036585 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.036612 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 13 D0713 08:46:02.036623 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:02.040634 352222 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0713 08:46:02.042200 352222 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler D0713 08:46:02.046059 352222 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.046111 352222 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc002e2a1b0 14 D0713 08:46:02.046128 352222 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:02.046213 352222 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.046244 352222 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.046249 352222 task_signals.go:204] [ 1132: 1134] Signal 1132, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.046273 352222 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.046279 352222 task_signals.go:204] [ 1132: 1133] Signal 1132, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.046274 352222 task_signals.go:204] [ 1132: 1135] Signal 1132, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.046304 352222 task_signals.go:204] [ 1132: 1136] Signal 1132, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.046320 352222 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.046334 352222 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.046346 352222 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.046352 352222 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.046356 352222 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.046363 352222 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.046373 352222 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.046389 352222 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.046411 352222 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.047577 352222 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.047597 352222 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.047609 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.047641 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.047666 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.047821 352222 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.048193 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.048235 352222 task_signals.go:481] [ 5: 13] No task notified of signal 23 D0713 08:46:02.049674 352222 syscalls.go:262] [ 1137: 1137] Allocating stack with size of 8388608 bytes D0713 08:46:02.049759 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.049870 352222 task_signals.go:220] [ 5: 13] Signal 23: delivering to handler D0713 08:46:02.051059 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.051090 352222 usertrap_amd64.go:106] [ 1137: 1137] Map a usertrap vma at 60000 D0713 08:46:02.051157 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 1 D0713 08:46:02.051173 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:02.051704 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.051757 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 2 D0713 08:46:02.051776 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:02.052679 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.052704 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 3 D0713 08:46:02.052713 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:02.058632 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.058655 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 4 D0713 08:46:02.058664 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:02.059692 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.059718 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 5 D0713 08:46:02.059727 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:02.059851 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.059874 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 6 D0713 08:46:02.059884 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:02.060229 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.060248 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 7 D0713 08:46:02.060255 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:02.060481 352222 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.060535 352222 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc002c1e1e0 8 D0713 08:46:02.060558 352222 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:02.060714 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.060742 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 9 D0713 08:46:02.060755 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:02.060771 352222 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.060780 352222 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc002c1e1e0 10 D0713 08:46:02.060797 352222 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:02.067877 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.067911 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 11 D0713 08:46:02.067924 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:02.071930 352222 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.071962 352222 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc002c1e1e0 12 D0713 08:46:02.071974 352222 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:02.072003 352222 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.072009 352222 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc002c1e1e0 13 D0713 08:46:02.072025 352222 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:02.072097 352222 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0713 08:46:02.072177 352222 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0713 08:46:02.077732 352222 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.077793 352222 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc002c1e1e0 14 D0713 08:46:02.077820 352222 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:02.077911 352222 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.077956 352222 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.077958 352222 task_signals.go:204] [ 1137: 1140] Signal 1137, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.077988 352222 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.077989 352222 task_signals.go:204] [ 1137: 1142] Signal 1137, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.078008 352222 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.077992 352222 task_signals.go:204] [ 1137: 1139] Signal 1137, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.078023 352222 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.078039 352222 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.078065 352222 task_signals.go:204] [ 1137: 1138] Signal 1137, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.078090 352222 task_signals.go:204] [ 1137: 1141] Signal 1137, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.078111 352222 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.078132 352222 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.078157 352222 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.078181 352222 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.078187 352222 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.078198 352222 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.078205 352222 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.078209 352222 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.078217 352222 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.079284 352222 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.079312 352222 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.079323 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.079358 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.079376 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.079492 352222 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.080077 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.081943 352222 syscalls.go:262] [ 1143: 1143] Allocating stack with size of 8388608 bytes D0713 08:46:02.082056 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.083449 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.083495 352222 usertrap_amd64.go:106] [ 1143: 1143] Map a usertrap vma at 66000 D0713 08:46:02.083635 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 1 D0713 08:46:02.083670 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:02.084127 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.084146 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 2 D0713 08:46:02.084156 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:02.084770 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.084790 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 3 D0713 08:46:02.084800 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:02.090942 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.090980 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 4 D0713 08:46:02.090994 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:02.092090 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.092118 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 5 D0713 08:46:02.092128 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:02.092185 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.092198 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 6 D0713 08:46:02.092203 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:02.092489 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.092509 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 7 D0713 08:46:02.092518 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:02.092696 352222 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.092722 352222 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc002e2a5a0 8 D0713 08:46:02.092731 352222 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:02.092854 352222 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.092884 352222 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc002e2a5a0 9 D0713 08:46:02.092895 352222 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:02.093037 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.093060 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 10 D0713 08:46:02.093070 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:02.093885 352222 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.093960 352222 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc002e2a5a0 11 D0713 08:46:02.093985 352222 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:02.094013 352222 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.094034 352222 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc002e2a5a0 12 D0713 08:46:02.094042 352222 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:02.094113 352222 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0713 08:46:02.094151 352222 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler D0713 08:46:02.101755 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.101787 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 13 D0713 08:46:02.101800 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:02.104702 352222 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0713 08:46:02.104753 352222 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler I0713 08:46:02.111963 352222 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 08:46:02.112115 352222 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.112132 352222 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc002e2a5a0 14 D0713 08:46:02.112147 352222 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:02.112237 352222 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.112266 352222 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.112292 352222 task_signals.go:204] [ 1143: 1146] Signal 1143, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.112284 352222 task_signals.go:204] [ 1143: 1144] Signal 1143, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.112314 352222 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.112306 352222 task_signals.go:204] [ 1143: 1145] Signal 1143, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.112325 352222 task_signals.go:204] [ 1143: 1147] Signal 1143, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.112337 352222 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.112349 352222 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.112361 352222 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.112368 352222 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.112373 352222 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.112381 352222 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.112387 352222 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.112399 352222 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.112407 352222 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.114007 352222 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.114041 352222 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.114058 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.114088 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.114107 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.114283 352222 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.114779 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.116312 352222 syscalls.go:262] [ 1148: 1148] Allocating stack with size of 8388608 bytes D0713 08:46:02.116421 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.118107 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.118137 352222 usertrap_amd64.go:106] [ 1148: 1148] Map a usertrap vma at 66000 D0713 08:46:02.118208 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 1 D0713 08:46:02.118229 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:46:02.118774 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.118812 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 2 D0713 08:46:02.118829 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:46:02.119528 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.119578 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 3 D0713 08:46:02.119617 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:46:02.126103 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.126140 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 4 D0713 08:46:02.126155 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:46:02.127260 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.127284 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 5 D0713 08:46:02.127294 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:46:02.127348 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.127365 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 6 D0713 08:46:02.127373 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:46:02.127625 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.127645 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 7 D0713 08:46:02.127653 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:46:02.127949 352222 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.127975 352222 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc002d604e0 8 D0713 08:46:02.127990 352222 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:46:02.128297 352222 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.128321 352222 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc002d604e0 9 D0713 08:46:02.128333 352222 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:46:02.128507 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.128530 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 10 D0713 08:46:02.128539 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:46:02.129125 352222 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.129172 352222 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc002d604e0 11 D0713 08:46:02.129188 352222 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:46:02.129238 352222 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.129271 352222 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc002d604e0 12 D0713 08:46:02.129280 352222 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:46:02.129352 352222 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 08:46:02.129520 352222 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 08:46:02.136745 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.136771 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 13 D0713 08:46:02.136781 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:46:02.140359 352222 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 08:46:02.140487 352222 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 08:46:02.147637 352222 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.147696 352222 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc002d604e0 14 D0713 08:46:02.147712 352222 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:46:02.147784 352222 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.147806 352222 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.147850 352222 task_signals.go:204] [ 1148: 1149] Signal 1148, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.147869 352222 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.147860 352222 task_signals.go:204] [ 1148: 1150] Signal 1148, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.147878 352222 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.147884 352222 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.147905 352222 task_signals.go:204] [ 1148: 1151] Signal 1148, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.147924 352222 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.147932 352222 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.147937 352222 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.147949 352222 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.147964 352222 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.147968 352222 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.147943 352222 task_signals.go:204] [ 1148: 1152] Signal 1148, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.148023 352222 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.149902 352222 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.149957 352222 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.149974 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.150009 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.150018 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.150120 352222 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.150744 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.152297 352222 syscalls.go:262] [ 1153: 1153] Allocating stack with size of 8388608 bytes D0713 08:46:02.152419 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.154257 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.154300 352222 usertrap_amd64.go:106] [ 1153: 1153] Map a usertrap vma at 67000 D0713 08:46:02.154435 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 1 D0713 08:46:02.154468 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:46:02.154931 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.155032 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 2 D0713 08:46:02.155060 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:46:02.155862 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.155885 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 3 D0713 08:46:02.155892 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:46:02.162513 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.162538 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 4 D0713 08:46:02.162549 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:46:02.163946 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.163975 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 5 D0713 08:46:02.163989 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:46:02.164052 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.164065 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 6 D0713 08:46:02.164072 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:46:02.164554 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.164615 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 7 D0713 08:46:02.164631 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:46:02.164836 352222 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.164862 352222 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc002d60660 8 D0713 08:46:02.164872 352222 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:46:02.165111 352222 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.165133 352222 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc002d60660 9 D0713 08:46:02.165148 352222 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:46:02.165273 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.165296 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 10 D0713 08:46:02.165306 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:46:02.172921 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.173037 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 11 D0713 08:46:02.173057 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:46:02.177254 352222 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.177308 352222 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc002d60660 12 D0713 08:46:02.177332 352222 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:46:02.177383 352222 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.177417 352222 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc002d60660 13 D0713 08:46:02.177429 352222 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:46:02.177483 352222 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 08:46:02.177568 352222 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 08:46:02.185189 352222 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.185239 352222 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc002d60660 14 D0713 08:46:02.185286 352222 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:46:02.185355 352222 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.185383 352222 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.185415 352222 task_signals.go:204] [ 1153: 1154] Signal 1153, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.185444 352222 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.185455 352222 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.185459 352222 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.185491 352222 task_signals.go:204] [ 1153: 1155] Signal 1153, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.185509 352222 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.185515 352222 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.185519 352222 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.185560 352222 task_signals.go:204] [ 1153: 1156] Signal 1153, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.185617 352222 task_signals.go:204] [ 1153: 1157] Signal 1153, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.185655 352222 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.185681 352222 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.185840 352222 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.185883 352222 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.187246 352222 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.187286 352222 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.187309 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.187356 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.187370 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.187459 352222 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.188028 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.189985 352222 syscalls.go:262] [ 1158: 1158] Allocating stack with size of 8388608 bytes D0713 08:46:02.190137 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.191352 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.191429 352222 usertrap_amd64.go:106] [ 1158: 1158] Map a usertrap vma at 6a000 D0713 08:46:02.191537 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 1 D0713 08:46:02.191568 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:02.192019 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.192053 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 2 D0713 08:46:02.192070 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:02.192920 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.192972 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 3 D0713 08:46:02.192986 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:02.199856 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.199912 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 4 D0713 08:46:02.199928 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:02.201165 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.201189 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 5 D0713 08:46:02.201197 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:02.201263 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.201269 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 6 D0713 08:46:02.201280 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:02.201885 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.201930 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 7 D0713 08:46:02.201939 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:02.202224 352222 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.202242 352222 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc00118c2d0 8 D0713 08:46:02.202250 352222 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:02.202545 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.202583 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 9 D0713 08:46:02.202599 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:02.202614 352222 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.202619 352222 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc00118c2d0 10 D0713 08:46:02.202701 352222 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:02.202774 352222 usertrap_amd64.go:212] [ 1158: 1161] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:02.202784 352222 usertrap_amd64.go:122] [ 1158: 1161] Allocate a new trap: 0xc00118c2d0 11 D0713 08:46:02.202798 352222 usertrap_amd64.go:225] [ 1158: 1161] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:02.211053 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.211086 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 12 D0713 08:46:02.211096 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:02.213691 352222 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.213742 352222 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc00118c2d0 13 D0713 08:46:02.213764 352222 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:02.213878 352222 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.213922 352222 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc00118c2d0 14 D0713 08:46:02.213940 352222 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:02.214012 352222 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 08:46:02.214122 352222 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 08:46:02.222420 352222 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.222473 352222 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc00118c2d0 15 D0713 08:46:02.222493 352222 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:46:02.222580 352222 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.222621 352222 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.222657 352222 task_signals.go:204] [ 1158: 1161] Signal 1158, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.222675 352222 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.222683 352222 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.222688 352222 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.222661 352222 task_signals.go:204] [ 1158: 1159] Signal 1158, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.222712 352222 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.222703 352222 task_signals.go:204] [ 1158: 1162] Signal 1158, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.222718 352222 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.222723 352222 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.222710 352222 task_signals.go:204] [ 1158: 1163] Signal 1158, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.222732 352222 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.222745 352222 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.222660 352222 task_signals.go:204] [ 1158: 1160] Signal 1158, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.222750 352222 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.222761 352222 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.222808 352222 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.222815 352222 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.222836 352222 task_exit.go:204] [ 1158: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.224360 352222 task_exit.go:204] [ 1158: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.224381 352222 task_exit.go:204] [ 1158: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.224397 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.224430 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.224455 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.224514 352222 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.225182 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.226703 352222 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0713 08:46:02.226817 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.228180 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.228215 352222 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 6a000 D0713 08:46:02.228293 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 1 D0713 08:46:02.228315 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:02.228672 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.228708 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 2 D0713 08:46:02.228721 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:02.229437 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.229468 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 3 D0713 08:46:02.229479 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:02.236102 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.236137 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 4 D0713 08:46:02.236148 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:02.237170 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.237204 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 5 D0713 08:46:02.237218 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:02.237267 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.237289 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 6 D0713 08:46:02.237295 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:02.237501 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.237515 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 7 D0713 08:46:02.237521 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:02.237667 352222 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.237688 352222 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000cef5c0 8 D0713 08:46:02.237698 352222 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:02.237819 352222 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.237843 352222 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000cef5c0 9 D0713 08:46:02.237855 352222 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:02.238021 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.238043 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 10 D0713 08:46:02.238054 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:02.238149 352222 usertrap_amd64.go:212] [ 1164: 1167] Found the pattern at ip 46b6e0:sysno 24 D0713 08:46:02.238171 352222 usertrap_amd64.go:122] [ 1164: 1167] Allocate a new trap: 0xc000cef5c0 11 D0713 08:46:02.238181 352222 usertrap_amd64.go:225] [ 1164: 1167] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:02.245187 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.245235 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 12 D0713 08:46:02.245253 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:02.248385 352222 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.248420 352222 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000cef5c0 13 D0713 08:46:02.248433 352222 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:02.248487 352222 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.248510 352222 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000cef5c0 14 D0713 08:46:02.248519 352222 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:02.248558 352222 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 08:46:02.248622 352222 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 08:46:02.255654 352222 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.255704 352222 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000cef5c0 15 D0713 08:46:02.255723 352222 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:46:02.255810 352222 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.255842 352222 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.255869 352222 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.255886 352222 task_signals.go:204] [ 1164: 1169] Signal 1164, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.255889 352222 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.255898 352222 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.255858 352222 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.255920 352222 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.255936 352222 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.256012 352222 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.256111 352222 task_exit.go:204] [ 1164: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.256142 352222 task_exit.go:204] [ 1164: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.256150 352222 task_exit.go:204] [ 1164: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.256165 352222 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.256187 352222 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.256192 352222 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.256204 352222 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.256213 352222 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.256219 352222 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.256229 352222 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.257485 352222 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.257518 352222 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.257539 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.257577 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.257589 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.257634 352222 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.258223 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.259662 352222 syscalls.go:262] [ 1170: 1170] Allocating stack with size of 8388608 bytes D0713 08:46:02.259803 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.261001 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.261044 352222 usertrap_amd64.go:106] [ 1170: 1170] Map a usertrap vma at 65000 D0713 08:46:02.261145 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 1 D0713 08:46:02.261172 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:46:02.261503 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.261525 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 2 D0713 08:46:02.261535 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:46:02.262174 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.262200 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 3 D0713 08:46:02.262236 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:46:02.267726 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.267752 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 4 D0713 08:46:02.267762 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:46:02.268736 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.268758 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 5 D0713 08:46:02.268768 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:46:02.268841 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.268878 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 6 D0713 08:46:02.268892 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:46:02.269314 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.269332 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 7 D0713 08:46:02.269338 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:46:02.269459 352222 usertrap_amd64.go:212] [ 1170: 1171] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.269477 352222 usertrap_amd64.go:122] [ 1170: 1171] Allocate a new trap: 0xc00118c4e0 8 D0713 08:46:02.269483 352222 usertrap_amd64.go:225] [ 1170: 1171] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:46:02.269683 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.269706 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 9 D0713 08:46:02.269716 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:46:02.269802 352222 usertrap_amd64.go:212] [ 1170: 1171] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.269821 352222 usertrap_amd64.go:122] [ 1170: 1171] Allocate a new trap: 0xc00118c4e0 10 D0713 08:46:02.269828 352222 usertrap_amd64.go:225] [ 1170: 1171] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:46:02.277020 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.277034 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 11 D0713 08:46:02.277041 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:46:02.280554 352222 usertrap_amd64.go:212] [ 1170: 1171] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.280581 352222 usertrap_amd64.go:122] [ 1170: 1171] Allocate a new trap: 0xc00118c4e0 12 D0713 08:46:02.280597 352222 usertrap_amd64.go:225] [ 1170: 1171] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:46:02.280641 352222 usertrap_amd64.go:212] [ 1170: 1171] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.280669 352222 usertrap_amd64.go:122] [ 1170: 1171] Allocate a new trap: 0xc00118c4e0 13 D0713 08:46:02.280678 352222 usertrap_amd64.go:225] [ 1170: 1171] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:46:02.280722 352222 task_signals.go:470] [ 1170: 1170] Notified of signal 23 D0713 08:46:02.280780 352222 task_signals.go:220] [ 1170: 1170] Signal 23: delivering to handler D0713 08:46:02.286896 352222 usertrap_amd64.go:212] [ 1170: 1170] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.286923 352222 usertrap_amd64.go:122] [ 1170: 1170] Allocate a new trap: 0xc00118c4e0 14 D0713 08:46:02.286934 352222 usertrap_amd64.go:225] [ 1170: 1170] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:46:02.286986 352222 task_exit.go:204] [ 1170: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.287002 352222 task_exit.go:204] [ 1170: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.287017 352222 task_signals.go:204] [ 1170: 1173] Signal 1170, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.287017 352222 task_signals.go:204] [ 1170: 1172] Signal 1170, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.287028 352222 task_exit.go:204] [ 1170: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.287041 352222 task_signals.go:204] [ 1170: 1174] Signal 1170, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.287046 352222 task_signals.go:204] [ 1170: 1171] Signal 1170, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.287061 352222 task_exit.go:204] [ 1170: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.287070 352222 task_exit.go:204] [ 1170: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.287083 352222 task_exit.go:204] [ 1170: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.287090 352222 task_exit.go:204] [ 1170: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.287098 352222 task_exit.go:204] [ 1170: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.287104 352222 task_exit.go:204] [ 1170: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.287110 352222 task_exit.go:204] [ 1170: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.287114 352222 task_exit.go:204] [ 1170: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.287129 352222 task_exit.go:204] [ 1170: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.288224 352222 task_exit.go:204] [ 1170: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.288246 352222 task_exit.go:204] [ 1170: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.288261 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.288280 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.288292 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.288368 352222 task_exit.go:204] [ 1170: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.289005 352222 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.290222 352222 syscalls.go:262] [ 1175: 1175] Allocating stack with size of 8388608 bytes D0713 08:46:02.290346 352222 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.291478 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.291510 352222 usertrap_amd64.go:106] [ 1175: 1175] Map a usertrap vma at 63000 D0713 08:46:02.291559 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 1 D0713 08:46:02.291574 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:02.291797 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.291813 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 2 D0713 08:46:02.291819 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:02.292231 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.292258 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 3 D0713 08:46:02.292275 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:02.297535 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.297572 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 4 D0713 08:46:02.297588 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:02.298645 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.298669 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 5 D0713 08:46:02.298679 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:02.298757 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.298779 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 6 D0713 08:46:02.298786 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:02.299031 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.299052 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 7 D0713 08:46:02.299060 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:02.299237 352222 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.299261 352222 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0009c48d0 8 D0713 08:46:02.299272 352222 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:02.299398 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.299436 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 9 D0713 08:46:02.299446 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:02.299506 352222 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.299523 352222 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0009c48d0 10 D0713 08:46:02.299595 352222 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:02.305999 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.306028 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 11 D0713 08:46:02.306036 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:02.310193 352222 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.310250 352222 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0009c48d0 12 D0713 08:46:02.310267 352222 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:02.310329 352222 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.310348 352222 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc0009c48d0 13 D0713 08:46:02.310360 352222 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:02.310378 352222 task_signals.go:470] [ 1175: 1175] Notified of signal 23 D0713 08:46:02.310423 352222 task_signals.go:220] [ 1175: 1175] Signal 23: delivering to handler D0713 08:46:02.315301 352222 sys_signal.go:495] [ 1175: 1175] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 08:46:02.315380 352222 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.315388 352222 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc0009c48d0 14 D0713 08:46:02.315397 352222 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:02.315413 352222 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.315440 352222 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.315456 352222 task_signals.go:204] [ 1175: 1176] Signal 1175, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.315467 352222 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.315479 352222 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.315483 352222 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.315496 352222 task_signals.go:204] [ 1175: 1177] Signal 1175, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.315513 352222 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.315522 352222 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.315527 352222 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.315538 352222 task_signals.go:204] [ 1175: 1178] Signal 1175, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.315554 352222 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.315558 352222 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.315562 352222 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.315592 352222 task_signals.go:204] [ 1175: 1179] Signal 1175, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.315602 352222 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.316554 352222 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.316583 352222 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.316592 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.316691 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.316742 352222 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.316750 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.318434 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.320500 352222 syscalls.go:262] [ 1180: 1180] Allocating stack with size of 8388608 bytes D0713 08:46:02.320676 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.324292 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.324324 352222 usertrap_amd64.go:106] [ 1180: 1180] Map a usertrap vma at 61000 D0713 08:46:02.324428 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 1 D0713 08:46:02.324444 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:46:02.325020 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.325032 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 2 D0713 08:46:02.325039 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:46:02.326373 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.326417 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 3 D0713 08:46:02.326433 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:46:02.332025 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.332053 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 4 D0713 08:46:02.332064 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:46:02.333114 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.333147 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 5 D0713 08:46:02.333160 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:46:02.333332 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.333355 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 6 D0713 08:46:02.333363 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:46:02.333682 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.333697 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 7 D0713 08:46:02.333702 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:46:02.333807 352222 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.333820 352222 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002e2aab0 8 D0713 08:46:02.333831 352222 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:46:02.333935 352222 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.333950 352222 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002e2aab0 9 D0713 08:46:02.333956 352222 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:46:02.334199 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.334247 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 10 D0713 08:46:02.334278 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:46:02.341747 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.341769 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 11 D0713 08:46:02.341777 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:46:02.345096 352222 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.345128 352222 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002e2aab0 12 D0713 08:46:02.345137 352222 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:46:02.345157 352222 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.345163 352222 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002e2aab0 13 D0713 08:46:02.345169 352222 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:46:02.345188 352222 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 08:46:02.345275 352222 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0713 08:46:02.350436 352222 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.350461 352222 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002e2aab0 14 D0713 08:46:02.350471 352222 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:46:02.350532 352222 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.350556 352222 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.350577 352222 task_signals.go:204] [ 1180: 1183] Signal 1180, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.350589 352222 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.350595 352222 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.350582 352222 task_signals.go:204] [ 1180: 1182] Signal 1180, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.350599 352222 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.350593 352222 task_signals.go:204] [ 1180: 1184] Signal 1180, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.350646 352222 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.350669 352222 task_signals.go:204] [ 1180: 1181] Signal 1180, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.350686 352222 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.350691 352222 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.350699 352222 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.350734 352222 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.350748 352222 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.350758 352222 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.351821 352222 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.351841 352222 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.351864 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.351907 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.351918 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.351978 352222 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.352558 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.354018 352222 syscalls.go:262] [ 1185: 1185] Allocating stack with size of 8388608 bytes D0713 08:46:02.354123 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.355426 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.355461 352222 usertrap_amd64.go:106] [ 1185: 1185] Map a usertrap vma at 68000 D0713 08:46:02.355543 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 1 D0713 08:46:02.355575 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:46:02.355903 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.355931 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 2 D0713 08:46:02.355944 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:46:02.356364 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.356387 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 3 D0713 08:46:02.356398 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:46:02.361419 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.361448 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 4 D0713 08:46:02.361458 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:46:02.362437 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.362470 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 5 D0713 08:46:02.362480 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:46:02.362529 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.362546 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 6 D0713 08:46:02.362551 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:46:02.362699 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.362714 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 7 D0713 08:46:02.362721 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:46:02.362795 352222 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.362810 352222 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000cefc20 8 D0713 08:46:02.362817 352222 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:46:02.363061 352222 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.363084 352222 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000cefc20 9 D0713 08:46:02.363093 352222 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:46:02.363111 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.363127 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 10 D0713 08:46:02.363176 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:46:02.369584 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.369610 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 11 D0713 08:46:02.369619 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:46:02.373413 352222 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.373439 352222 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000cefc20 12 D0713 08:46:02.373448 352222 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:46:02.373496 352222 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.373522 352222 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000cefc20 13 D0713 08:46:02.373533 352222 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:46:02.373560 352222 task_signals.go:470] [ 1185: 1185] Notified of signal 23 D0713 08:46:02.373617 352222 task_signals.go:220] [ 1185: 1185] Signal 23: delivering to handler D0713 08:46:02.378614 352222 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.378636 352222 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000cefc20 14 D0713 08:46:02.378645 352222 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:46:02.378659 352222 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.378669 352222 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.378678 352222 task_signals.go:204] [ 1185: 1188] Signal 1185, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.378684 352222 task_signals.go:204] [ 1185: 1189] Signal 1185, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.378694 352222 task_signals.go:204] [ 1185: 1190] Signal 1185, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.378705 352222 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.378718 352222 task_signals.go:204] [ 1185: 1187] Signal 1185, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.378729 352222 task_signals.go:204] [ 1185: 1186] Signal 1185, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.378753 352222 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.378778 352222 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.378787 352222 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.378794 352222 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.378797 352222 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.378805 352222 task_exit.go:204] [ 1185: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.378810 352222 task_exit.go:204] [ 1185: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.378813 352222 task_exit.go:204] [ 1185: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.378836 352222 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.378875 352222 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.378883 352222 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.378892 352222 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.379801 352222 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.379826 352222 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.379837 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.379874 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.379892 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.379958 352222 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.380604 352222 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.382147 352222 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0713 08:46:02.382260 352222 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.383386 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.383426 352222 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 69000 D0713 08:46:02.383505 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 1 D0713 08:46:02.383527 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:46:02.383935 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.383950 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 2 D0713 08:46:02.383959 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:46:02.384388 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.384416 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 3 D0713 08:46:02.384429 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:46:02.389937 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.389955 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 4 D0713 08:46:02.389967 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:46:02.391136 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.391158 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 5 D0713 08:46:02.391169 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:46:02.391243 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.391261 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 6 D0713 08:46:02.391270 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:46:02.391690 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.391716 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 7 D0713 08:46:02.391727 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:46:02.391921 352222 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.391940 352222 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0009c4cf0 8 D0713 08:46:02.391949 352222 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:46:02.392186 352222 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.392203 352222 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0009c4cf0 9 D0713 08:46:02.392214 352222 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:46:02.392237 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.392245 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 10 D0713 08:46:02.392253 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:46:02.392848 352222 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.392873 352222 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0009c4cf0 11 D0713 08:46:02.392884 352222 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:46:02.393057 352222 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.393104 352222 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0009c4cf0 12 D0713 08:46:02.393123 352222 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:46:02.393194 352222 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 08:46:02.393218 352222 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 08:46:02.399165 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.399207 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 13 D0713 08:46:02.399225 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:46:02.403643 352222 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 08:46:02.403690 352222 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 08:46:02.410011 352222 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.410051 352222 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0009c4cf0 14 D0713 08:46:02.410070 352222 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:46:02.410156 352222 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.410190 352222 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.410225 352222 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.410261 352222 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.410261 352222 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.410288 352222 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.410295 352222 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.410287 352222 task_signals.go:204] [ 1191: 1196] Signal 1191, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.410255 352222 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.410310 352222 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.410360 352222 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.410403 352222 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.410435 352222 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.410453 352222 task_exit.go:204] [ 1191: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.410463 352222 task_exit.go:204] [ 1191: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.410476 352222 task_exit.go:204] [ 1191: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.410488 352222 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.410495 352222 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.410500 352222 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.410509 352222 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.412255 352222 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.412278 352222 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.412290 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.412388 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.412416 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.412480 352222 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.413173 352222 task_stop.go:118] [ 5: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.415224 352222 syscalls.go:262] [ 1197: 1197] Allocating stack with size of 8388608 bytes D0713 08:46:02.415423 352222 task_stop.go:138] [ 5: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.416378 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.416410 352222 usertrap_amd64.go:106] [ 1197: 1197] Map a usertrap vma at 6a000 D0713 08:46:02.416523 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 1 D0713 08:46:02.416546 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:46:02.416921 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.416959 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 2 D0713 08:46:02.416970 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:46:02.417473 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.417490 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 3 D0713 08:46:02.417497 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:46:02.423150 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.423171 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 4 D0713 08:46:02.423183 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:46:02.424321 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.424338 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 5 D0713 08:46:02.424345 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:46:02.424358 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.424363 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 6 D0713 08:46:02.424368 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:46:02.424522 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.424535 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 7 D0713 08:46:02.424542 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:46:02.424617 352222 usertrap_amd64.go:212] [ 1197: 1198] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.424638 352222 usertrap_amd64.go:122] [ 1197: 1198] Allocate a new trap: 0xc000fa0d50 8 D0713 08:46:02.424648 352222 usertrap_amd64.go:225] [ 1197: 1198] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:46:02.424857 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.424885 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 9 D0713 08:46:02.424899 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:46:02.424930 352222 usertrap_amd64.go:212] [ 1197: 1198] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.424975 352222 usertrap_amd64.go:122] [ 1197: 1198] Allocate a new trap: 0xc000fa0d50 10 D0713 08:46:02.425013 352222 usertrap_amd64.go:225] [ 1197: 1198] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:46:02.432591 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.432622 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 11 D0713 08:46:02.432637 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:46:02.436180 352222 usertrap_amd64.go:212] [ 1197: 1198] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.436211 352222 usertrap_amd64.go:122] [ 1197: 1198] Allocate a new trap: 0xc000fa0d50 12 D0713 08:46:02.436225 352222 usertrap_amd64.go:225] [ 1197: 1198] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:46:02.436359 352222 usertrap_amd64.go:212] [ 1197: 1198] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.436403 352222 usertrap_amd64.go:122] [ 1197: 1198] Allocate a new trap: 0xc000fa0d50 13 D0713 08:46:02.436422 352222 usertrap_amd64.go:225] [ 1197: 1198] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:46:02.436482 352222 task_signals.go:470] [ 1197: 1197] Notified of signal 23 D0713 08:46:02.436572 352222 task_signals.go:220] [ 1197: 1197] Signal 23: delivering to handler D0713 08:46:02.443006 352222 usertrap_amd64.go:212] [ 1197: 1197] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.443038 352222 usertrap_amd64.go:122] [ 1197: 1197] Allocate a new trap: 0xc000fa0d50 14 D0713 08:46:02.443048 352222 usertrap_amd64.go:225] [ 1197: 1197] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:46:02.443154 352222 task_exit.go:204] [ 1197: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.443224 352222 task_exit.go:204] [ 1197: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.443257 352222 task_signals.go:204] [ 1197: 1199] Signal 1197, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.443284 352222 task_exit.go:204] [ 1197: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.443291 352222 task_exit.go:204] [ 1197: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.443296 352222 task_exit.go:204] [ 1197: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.443256 352222 task_signals.go:204] [ 1197: 1201] Signal 1197, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.443320 352222 task_signals.go:204] [ 1197: 1198] Signal 1197, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.443338 352222 task_exit.go:204] [ 1197: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.443348 352222 task_signals.go:204] [ 1197: 1200] Signal 1197, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.443358 352222 task_exit.go:204] [ 1197: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.443363 352222 task_exit.go:204] [ 1197: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.443374 352222 task_exit.go:204] [ 1197: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.443406 352222 task_exit.go:204] [ 1197: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.443414 352222 task_exit.go:204] [ 1197: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.443431 352222 task_exit.go:204] [ 1197: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.444910 352222 task_exit.go:204] [ 1197: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.444963 352222 task_exit.go:204] [ 1197: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.444996 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.445025 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.445048 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.445213 352222 task_exit.go:204] [ 1197: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.445770 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.447572 352222 syscalls.go:262] [ 1202: 1202] Allocating stack with size of 8388608 bytes D0713 08:46:02.447728 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.448845 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.448879 352222 usertrap_amd64.go:106] [ 1202: 1202] Map a usertrap vma at 60000 D0713 08:46:02.448986 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 1 D0713 08:46:02.449004 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:46:02.449297 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.449315 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 2 D0713 08:46:02.449323 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:46:02.449680 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.449693 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 3 D0713 08:46:02.449700 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:46:02.454853 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.454879 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 4 D0713 08:46:02.454889 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:46:02.456068 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.456101 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 5 D0713 08:46:02.456115 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:46:02.456177 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.456187 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 6 D0713 08:46:02.456199 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:46:02.456649 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.456673 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 7 D0713 08:46:02.456689 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:46:02.456829 352222 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.456852 352222 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc002e2ae40 8 D0713 08:46:02.456865 352222 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:46:02.457084 352222 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.457108 352222 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc002e2ae40 9 D0713 08:46:02.457119 352222 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:46:02.457132 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.457140 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 10 D0713 08:46:02.457150 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:46:02.465427 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.465472 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 11 D0713 08:46:02.465487 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:46:02.469194 352222 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.469226 352222 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc002e2ae40 12 D0713 08:46:02.469238 352222 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:46:02.469317 352222 usertrap_amd64.go:212] [ 1202: 1203] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.469325 352222 usertrap_amd64.go:122] [ 1202: 1203] Allocate a new trap: 0xc002e2ae40 13 D0713 08:46:02.469333 352222 usertrap_amd64.go:225] [ 1202: 1203] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:46:02.469357 352222 task_signals.go:470] [ 1202: 1202] Notified of signal 23 D0713 08:46:02.469462 352222 task_signals.go:220] [ 1202: 1202] Signal 23: delivering to handler D0713 08:46:02.475704 352222 usertrap_amd64.go:212] [ 1202: 1202] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.475737 352222 usertrap_amd64.go:122] [ 1202: 1202] Allocate a new trap: 0xc002e2ae40 14 D0713 08:46:02.475749 352222 usertrap_amd64.go:225] [ 1202: 1202] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:46:02.475818 352222 task_exit.go:204] [ 1202: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.475842 352222 task_exit.go:204] [ 1202: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.475872 352222 task_signals.go:204] [ 1202: 1205] Signal 1202, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.475887 352222 task_exit.go:204] [ 1202: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.475895 352222 task_exit.go:204] [ 1202: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.475913 352222 task_exit.go:204] [ 1202: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.475876 352222 task_signals.go:204] [ 1202: 1203] Signal 1202, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.475930 352222 task_signals.go:204] [ 1202: 1204] Signal 1202, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.475940 352222 task_exit.go:204] [ 1202: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.475951 352222 task_signals.go:204] [ 1202: 1206] Signal 1202, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.475969 352222 task_exit.go:204] [ 1202: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.475973 352222 task_exit.go:204] [ 1202: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.475982 352222 task_exit.go:204] [ 1202: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.475988 352222 task_exit.go:204] [ 1202: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.475992 352222 task_exit.go:204] [ 1202: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.476015 352222 task_exit.go:204] [ 1202: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.477539 352222 task_exit.go:204] [ 1202: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.477579 352222 task_exit.go:204] [ 1202: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.477597 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.477647 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.477669 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.477787 352222 task_exit.go:204] [ 1202: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.478325 352222 task_stop.go:118] [ 5: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.479628 352222 syscalls.go:262] [ 1207: 1207] Allocating stack with size of 8388608 bytes D0713 08:46:02.479724 352222 task_stop.go:138] [ 5: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.481404 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.481488 352222 usertrap_amd64.go:106] [ 1207: 1207] Map a usertrap vma at 63000 D0713 08:46:02.481602 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 1 D0713 08:46:02.481636 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:46:02.482245 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.482274 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 2 D0713 08:46:02.482292 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:46:02.483059 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.483090 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 3 D0713 08:46:02.483102 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:46:02.489856 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.489888 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 4 D0713 08:46:02.489902 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:46:02.491151 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.491192 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 5 D0713 08:46:02.491208 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:46:02.491262 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.491275 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 6 D0713 08:46:02.491281 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:46:02.491461 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.491481 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 7 D0713 08:46:02.491487 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:46:02.491639 352222 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.491656 352222 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc000ceffb0 8 D0713 08:46:02.491662 352222 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:46:02.491964 352222 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.491995 352222 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc000ceffb0 9 D0713 08:46:02.492006 352222 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:46:02.492120 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.492144 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 10 D0713 08:46:02.492170 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:46:02.499639 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.499672 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 11 D0713 08:46:02.499684 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:46:02.502326 352222 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.502355 352222 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc000ceffb0 12 D0713 08:46:02.502373 352222 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:46:02.502465 352222 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.502485 352222 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc000ceffb0 13 D0713 08:46:02.502499 352222 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:46:02.502564 352222 task_signals.go:470] [ 1207: 1207] Notified of signal 23 D0713 08:46:02.502666 352222 task_signals.go:220] [ 1207: 1207] Signal 23: delivering to handler D0713 08:46:02.509814 352222 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46ae44:sysno 231 D0713 08:46:02.509845 352222 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc000ceffb0 14 D0713 08:46:02.509859 352222 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:46:02.509927 352222 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.509963 352222 task_signals.go:204] [ 1207: 1209] Signal 1207, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.510004 352222 task_signals.go:204] [ 1207: 1208] Signal 1207, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.510019 352222 task_signals.go:204] [ 1207: 1211] Signal 1207, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.510028 352222 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.510040 352222 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.510047 352222 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.510051 352222 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.510040 352222 task_signals.go:204] [ 1207: 1210] Signal 1207, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0713 08:46:02.510076 352222 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.510082 352222 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.510086 352222 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.510093 352222 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.510106 352222 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.510110 352222 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.510122 352222 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:46:02.511570 352222 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:46:02.511597 352222 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.511612 352222 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:46:02.511649 352222 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:46:02.511676 352222 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:46:02.511767 352222 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:46:02.512486 352222 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.514048 352222 syscalls.go:262] [ 1212: 1212] Allocating stack with size of 8388608 bytes D0713 08:46:02.514160 352222 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:46:02.515620 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b70f:sysno 204 D0713 08:46:02.515658 352222 usertrap_amd64.go:106] [ 1212: 1212] Map a usertrap vma at 62000 D0713 08:46:02.515738 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 1 D0713 08:46:02.515759 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:46:02.516050 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46ae93:sysno 257 D0713 08:46:02.516069 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 2 D0713 08:46:02.516076 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:46:02.516683 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b41d:sysno 9 D0713 08:46:02.516705 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 3 D0713 08:46:02.516712 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:46:02.522292 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b1d3:sysno 14 D0713 08:46:02.522317 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 4 D0713 08:46:02.522328 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:46:02.523394 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46afa0:sysno 186 D0713 08:46:02.523420 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 5 D0713 08:46:02.523431 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:46:02.523493 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b214:sysno 13 D0713 08:46:02.523514 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 6 D0713 08:46:02.523522 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:46:02.523957 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b5eb:sysno 56 D0713 08:46:02.523972 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 7 D0713 08:46:02.523983 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:46:02.524096 352222 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b60c:sysno 186 D0713 08:46:02.524121 352222 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc0009c5140 8 D0713 08:46:02.524134 352222 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:46:02.524312 352222 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46af76:sysno 35 D0713 08:46:02.524338 352222 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc0009c5140 9 D0713 08:46:02.524347 352222 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:46:02.524451 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b57c:sysno 202 D0713 08:46:02.524472 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 10 D0713 08:46:02.524481 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:46:02.532365 352222 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46af29:sysno 293 D0713 08:46:02.532394 352222 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc0009c5140 11 D0713 08:46:02.532403 352222 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:46:02.534900 352222 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b020:sysno 39 D0713 08:46:02.534929 352222 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc0009c5140 12 D0713 08:46:02.534941 352222 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:46:02.534965 352222 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b04f:sysno 234 D0713 08:46:02.534976 352222 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc0009c5140 13 D0713 08:46:02.534984 352222 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:46:02.535051 352222 task_signals.go:470] [ 1212: 1212] Notified of signal 23 D0713 08:46:02.535115 352222 task_signals.go:220] [ 1212: 1212] Signal 23: delivering to handler D0713 08:46:02.542782 352222 task_signals.go:309] [ 1212: 1212] failed to restore from a signal frame: bad address D0713 08:46:02.542820 352222 task_signals.go:470] [ 1212: 1212] Notified of signal 11 D0713 08:46:02.542837 352222 task_signals.go:220] [ 1212: 1212] Signal 11: delivering to handler W0713 08:46:02.564298 352346 util.go:64] FATAL ERROR: waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 08:46:02.564519 352346 main.go:274] Failure to execute command, err: 1 W0713 08:46:02.577421 352189 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 08:46:02.577432 1 connection.go:127] sock read failed, closing connection: EOF I0713 08:46:02.577583 1 gofer.go:319] All lisafs servers exited. I0713 08:46:02.577625 1 main.go:265] Exiting with status: 0 D0713 08:46:02.578338 352189 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-test-0 D0713 08:46:02.578500 352189 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-test-0 D0713 08:46:02.578525 352189 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-test-0 D0713 08:46:02.578575 352189 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.578688 352189 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-test-0, PID: 352212 D0713 08:46:02.582086 352189 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582151 352189 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582248 352189 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582316 352189 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582352 352189 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582380 352189 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582444 352189 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582519 352189 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582649 352189 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.582678 352189 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.583019 352189 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.583045 352189 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.583060 352189 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-cover-test-0" D0713 08:46:02.583170 352189 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-cover-test-0" I0713 08:46:02.583460 352189 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 08:46:02.628820 352849 main.go:230] *************************** I0713 08:46:02.628884 352849 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0713 08:46:02.628914 352849 main.go:232] Version 0.0.0 I0713 08:46:02.628929 352849 main.go:233] GOOS: linux I0713 08:46:02.628986 352849 main.go:234] GOARCH: amd64 I0713 08:46:02.629010 352849 main.go:235] PID: 352849 I0713 08:46:02.629035 352849 main.go:236] UID: 0, GID: 0 I0713 08:46:02.629050 352849 main.go:237] Configuration: I0713 08:46:02.629065 352849 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 08:46:02.629080 352849 main.go:239] Platform: systrap I0713 08:46:02.629095 352849 main.go:240] FileAccess: shared I0713 08:46:02.629116 352849 main.go:241] Directfs: true I0713 08:46:02.629132 352849 main.go:242] Overlay: none I0713 08:46:02.629148 352849 main.go:243] Network: sandbox, logging: false I0713 08:46:02.629166 352849 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:46:02.629181 352849 main.go:245] IOURING: false I0713 08:46:02.629196 352849 main.go:246] Debug: true I0713 08:46:02.629211 352849 main.go:247] Systemd: false I0713 08:46:02.629226 352849 main.go:248] *************************** D0713 08:46:02.629262 352849 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:46:02.629357 352849 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0713 08:46:02.629424 352849 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-test-0"]: exit status 128 I0713 08:46:02.628820 352849 main.go:230] *************************** I0713 08:46:02.628884 352849 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0713 08:46:02.628914 352849 main.go:232] Version 0.0.0 I0713 08:46:02.628929 352849 main.go:233] GOOS: linux I0713 08:46:02.628986 352849 main.go:234] GOARCH: amd64 I0713 08:46:02.629010 352849 main.go:235] PID: 352849 I0713 08:46:02.629035 352849 main.go:236] UID: 0, GID: 0 I0713 08:46:02.629050 352849 main.go:237] Configuration: I0713 08:46:02.629065 352849 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 08:46:02.629080 352849 main.go:239] Platform: systrap I0713 08:46:02.629095 352849 main.go:240] FileAccess: shared I0713 08:46:02.629116 352849 main.go:241] Directfs: true I0713 08:46:02.629132 352849 main.go:242] Overlay: none I0713 08:46:02.629148 352849 main.go:243] Network: sandbox, logging: false I0713 08:46:02.629166 352849 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:46:02.629181 352849 main.go:245] IOURING: false I0713 08:46:02.629196 352849 main.go:246] Debug: true I0713 08:46:02.629211 352849 main.go:247] Systemd: false I0713 08:46:02.629226 352849 main.go:248] *************************** D0713 08:46:02.629262 352849 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:46:02.629357 352849 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0713 08:46:02.629424 352849 main.go:274] Failure to execute command, err: 1 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621743.423222] audit: type=1326 audit(1689225490.620:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621783.864792] audit: type=1326 audit(1689225531.060:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=638357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621809.898362] audit: type=1326 audit(1689225557.092:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11621826.174675] audit: type=1326 audit(1689225573.372:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621885.405910] audit: type=1326 audit(1689225632.600:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=645644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621926.533008] audit: type=1326 audit(1689225673.728:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621949.459338] audit: type=1326 audit(1689225696.656:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662571 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11621949.730129] audit: type=1326 audit(1689225696.924:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662605 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11622002.580862] audit: type=1326 audit(1689225749.776:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622027.131721] audit: type=1326 audit(1689225774.328:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622069.015849] audit: type=1326 audit(1689225816.212:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622089.768391] audit: type=1326 audit(1689225836.964:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=653611 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622168.625168] audit: type=1326 audit(1689225915.820:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622169.672061] audit: type=1326 audit(1689225916.868:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=676306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622191.522526] audit: type=1326 audit(1689225938.716:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622312.206917] audit: type=1326 audit(1689226059.399:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622325.849714] audit: type=1326 audit(1689226073.043:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=683978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622348.404390] audit: type=1326 audit(1689226095.599:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622362.583610] audit: type=1326 audit(1689226109.779:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=704093 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622455.088113] audit: type=1326 audit(1689226202.283:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622466.935089] audit: type=1326 audit(1689226214.127:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705187 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622477.541452] audit: type=1326 audit(1689226224.735:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622557.455601] audit: type=1326 audit(1689226304.651:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=607978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622607.655309] audit: type=1326 audit(1689226354.851:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=717863 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622608.716470] audit: type=1326 audit(1689226355.911:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622691.701380] audit: type=1326 audit(1689226438.895:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622713.800154] audit: type=1326 audit(1689226460.995:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622751.328494] audit: type=1326 audit(1689226498.523:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=718888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622762.643571] audit: type=1326 audit(1689226509.839:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622857.536823] audit: type=1326 audit(1689226604.731:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=724188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622886.710765] audit: type=1326 audit(1689226633.903:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=669577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622895.764400] audit: type=1326 audit(1689226642.959:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622897.145368] audit: type=1326 audit(1689226644.339:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622929.466357] audit: type=1326 audit(1689226676.659:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735287 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622956.410483] audit: type=1326 audit(1689226703.603:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622978.960508] audit: type=1326 audit(1689226726.155:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738227 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623001.003074] audit: type=1326 audit(1689226748.195:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=732248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623039.810310] audit: type=1326 audit(1689226787.002:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623143.007157] audit: type=1326 audit(1689226890.198:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623181.887500] audit: type=1326 audit(1689226929.078:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=741553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623285.059938] audit: type=1326 audit(1689227032.254:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745101 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623305.303399] audit: type=1326 audit(1689227052.494:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=736691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623325.244781] audit: type=1326 audit(1689227072.438:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=747270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623428.088017] audit: type=1326 audit(1689227175.282:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=752283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623463.547698] audit: type=1326 audit(1689227210.738:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623474.427571] audit: type=1326 audit(1689227221.618:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623495.937493] audit: type=1326 audit(1689227243.130:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=761376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623568.906516] audit: type=1326 audit(1689227316.098:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=758566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623595.832182] exe[730275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623595.961141] exe[644712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.000996] exe[652865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.743131] exe[637295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623604.447949] audit: type=1326 audit(1689227351.638:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760384 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623658.555316] audit: type=1326 audit(1689227405.746:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623710.394610] audit: type=1326 audit(1689227457.586:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623726.609203] audit: type=1326 audit(1689227473.801:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=766143 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623747.678166] audit: type=1326 audit(1689227494.869:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770150 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623851.594772] audit: type=1326 audit(1689227598.785:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769254 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623880.762779] audit: type=1326 audit(1689227627.953:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623966.702688] audit: type=1326 audit(1689227713.893:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624021.714876] audit: type=1326 audit(1689227768.905:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=773928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624107.271418] audit: type=1326 audit(1689227854.461:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=776320 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624163.256303] audit: type=1326 audit(1689227910.445:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=778098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.491756] audit: type=1326 audit(1689227937.681:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.516497] audit: type=1326 audit(1689227937.681:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624304.302834] audit: type=1326 audit(1689228051.493:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=781625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624308.164373] audit: type=1326 audit(1689228055.353:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11624331.516421] audit: type=1326 audit(1689228078.705:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=782698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624445.669622] audit: type=1326 audit(1689228192.861:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=785440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624473.221794] audit: type=1326 audit(1689228220.412:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624555.592591] exe[793350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.750660] exe[793763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.917923] exe[794368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.959425] exe[792613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.991400] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.018684] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.046809] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.077658] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.109453] exe[794436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.141961] exe[792456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624587.760151] audit: type=1326 audit(1689228334.952:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=791612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624614.813722] audit: type=1326 audit(1689228362.008:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624618.861142] warn_bad_vsyscall: 25 callbacks suppressed [11624618.861146] exe[794214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951732ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624618.991086] exe[784251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.109805] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.131399] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.152622] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.173362] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.193902] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.214545] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.235685] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.256595] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624732.224293] audit: type=1326 audit(1689228479.416:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=794869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624753.931616] audit: type=1326 audit(1689228501.124:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624758.040439] audit: type=1326 audit(1689228505.232:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795639 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624767.348557] audit: type=1326 audit(1689228514.540:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624833.344804] warn_bad_vsyscall: 25 callbacks suppressed [11624833.344807] exe[800273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.429199] exe[800476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.462524] exe[800159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.541509] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.578722] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624899.299493] audit: type=1326 audit(1689228646.492:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798894 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625016.749456] audit: type=1326 audit(1689228763.944:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=801453 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625040.759280] audit: type=1326 audit(1689228787.952:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625158.624329] audit: type=1326 audit(1689228905.816:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625180.785519] audit: type=1326 audit(1689228927.975:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625183.324190] audit: type=1326 audit(1689228930.515:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807481 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.601942] audit: type=1326 audit(1689229021.795:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.626774] audit: type=1326 audit(1689229021.795:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625314.783822] audit: type=1326 audit(1689229061.975:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625416.747406] audit: type=1326 audit(1689229163.939:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=814251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625456.396419] audit: type=1326 audit(1689229203.587:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=815492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625478.400977] audit: type=1326 audit(1689229225.591:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625559.615083] audit: type=1326 audit(1689229306.807:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625581.523653] audit: type=1326 audit(1689229328.715:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824092 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625595.643023] audit: type=1326 audit(1689229342.835:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824605 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625608.211350] audit: type=1326 audit(1689229355.403:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625619.033525] audit: type=1326 audit(1689229366.223:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625632.774332] audit: type=1326 audit(1689229379.967:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826762 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.248629] audit: type=1326 audit(1689229394.439:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.274488] audit: type=1326 audit(1689229394.439:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625691.645735] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.722394] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.788927] exe[759679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd871ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.603423] exe[805730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.659667] exe[777097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.711809] exe[759699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.768562] exe[762237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.823356] exe[760291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625725.681681] exe[830444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485284ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.785481] exe[831134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485263ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.787596] exe[831141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.901955] exe[830351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625728.991542] audit: type=1326 audit(1689229476.183:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625749.908122] audit: type=1326 audit(1689229497.099:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625780.587397] audit: type=1326 audit(1689229527.779:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625923.389938] audit: type=1326 audit(1689229670.578:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=835161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625999.663124] audit: type=1326 audit(1689229746.854:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=842077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626029.740163] audit: type=1326 audit(1689229776.930:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=768381 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626030.055739] audit: type=1326 audit(1689229777.246:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=762300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626053.289519] audit: type=1326 audit(1689229800.478:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626060.094477] audit: type=1326 audit(1689229807.286:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626065.611638] audit: type=1326 audit(1689229812.802:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844994 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626115.632108] audit: type=1326 audit(1689229862.822:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=853899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626207.428319] audit: type=1326 audit(1689229954.618:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626229.347667] audit: type=1326 audit(1689229976.538:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626257.801803] audit: type=1326 audit(1689230004.990:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=864812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626281.709351] audit: type=1326 audit(1689230028.898:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786513 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626362.915375] audit: type=1326 audit(1689230110.106:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626384.676313] audit: type=1326 audit(1689230131.866:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626400.465790] audit: type=1326 audit(1689230147.654:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=871948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626431.889582] exe[824456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5ab9858 ax:0 si:557385f24062 di:ffffffffff600000 [11626431.977003] exe[822566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626432.752727] exe[868912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626449.844604] audit: type=1326 audit(1689230197.034:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626467.900586] audit: type=1326 audit(1689230215.090:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=858178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626471.085337] audit: type=1326 audit(1689230218.274:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=884835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626518.208159] audit: type=1326 audit(1689230265.398:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=880419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626541.520466] audit: type=1326 audit(1689230288.710:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=882137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626621.306742] audit: type=1326 audit(1689230368.493:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802627 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626661.669412] audit: type=1326 audit(1689230408.857:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626682.654851] audit: type=1326 audit(1689230429.841:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=857778 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626683.322679] audit: type=1326 audit(1689230430.509:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=891507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626685.102443] exe[763210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092f0858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.897261] exe[760292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.947864] exe[759743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626802.478088] audit: type=1326 audit(1689230549.665:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626802.608213] audit: type=1326 audit(1689230549.797:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897429 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626870.811131] audit: type=1326 audit(1689230617.997:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=887503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626884.103833] audit: type=1326 audit(1689230631.293:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626944.498138] audit: type=1326 audit(1689230691.685:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906454 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626945.317806] audit: type=1326 audit(1689230692.505:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906607 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626967.298336] audit: type=1326 audit(1689230714.485:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627084.586021] audit: type=1326 audit(1689230831.773:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627085.711150] audit: type=1326 audit(1689230832.897:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627216.037403] audit: type=1326 audit(1689230963.225:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627226.699396] audit: type=1326 audit(1689230973.885:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627292.565800] audit: type=1326 audit(1689231039.753:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=926237 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627306.809578] audit: type=1326 audit(1689231053.997:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898956 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627326.411262] audit: type=1326 audit(1689231073.597:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627329.171050] audit: type=1326 audit(1689231076.357:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627343.697582] audit: type=1326 audit(1689231090.884:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627347.341765] audit: type=1326 audit(1689231094.528:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627387.724194] audit: type=1326 audit(1689231134.916:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627460.083551] audit: type=1326 audit(1689231207.272:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627471.117425] audit: type=1326 audit(1689231218.308:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=928833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627602.515828] audit: type=1326 audit(1689231349.708:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=935893 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627612.770608] audit: type=1326 audit(1689231359.960:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=936377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627702.324683] audit: type=1326 audit(1689231449.516:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=876414 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627718.852703] audit: type=1326 audit(1689231466.044:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627744.507821] audit: type=1326 audit(1689231491.696:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627747.677132] audit: type=1326 audit(1689231494.868:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940246 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627883.851097] audit: type=1326 audit(1689231631.040:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=947704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627889.977150] audit: type=1326 audit(1689231637.168:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=948272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628024.911620] audit: type=1326 audit(1689231772.100:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=952771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628031.160290] audit: type=1326 audit(1689231778.352:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628040.642956] audit: type=1326 audit(1689231787.832:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=875034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11628046.113827] audit: type=1326 audit(1689231793.304:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958380 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628172.389002] audit: type=1326 audit(1689231919.579:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628179.234029] audit: type=1326 audit(1689231926.423:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628314.064309] audit: type=1326 audit(1689232061.251:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=962918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628322.164937] audit: type=1326 audit(1689232069.355:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963597 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628455.457515] audit: type=1326 audit(1689232202.647:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628464.666558] audit: type=1326 audit(1689232211.855:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946366 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628465.406719] audit: type=1326 audit(1689232212.595:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628570.305980] audit: type=1326 audit(1689232317.495:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931969 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628597.543731] audit: type=1326 audit(1689232344.731:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973452 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628607.168180] audit: type=1326 audit(1689232354.355:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628620.077308] audit: type=1326 audit(1689232367.267:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628686.349336] audit: type=1326 audit(1689232433.539:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628716.179608] audit: type=1326 audit(1689232463.367:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978986 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628753.935398] audit: type=1326 audit(1689232501.123:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979334 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628770.433520] audit: type=1326 audit(1689232517.623:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=933516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628827.383465] exe[951513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe7cee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.369955] exe[947115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe3aee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.550136] exe[929130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bf9feee8 ax:0 si:2001a180 di:ffffffffff600000 [11628832.839056] exe[953074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628832.962027] exe[916409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628833.786893] exe[955401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628842.002990] audit: type=1326 audit(1689232589.190:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628857.897703] audit: type=1326 audit(1689232605.086:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=982954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628984.531869] audit: type=1326 audit(1689232731.718:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629025.421318] audit: type=1326 audit(1689232772.606:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629126.804451] audit: type=1326 audit(1689232873.990:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629148.856386] audit: type=1326 audit(1689232896.042:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629167.381892] audit: type=1326 audit(1689232914.570:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=993836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629194.884387] audit: type=1326 audit(1689232942.070:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629208.030223] audit: type=1326 audit(1689232955.218:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629230.447902] audit: type=1326 audit(1689232977.634:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629283.572378] audit: type=1326 audit(1689233030.758:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629309.223026] audit: type=1326 audit(1689233056.410:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629402.127757] exe[15167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629402.925691] exe[15173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629403.044266] exe[13690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629412.163848] audit: type=1326 audit(1689233159.350:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629425.210591] audit: type=1326 audit(1689233172.398:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629451.501171] audit: type=1326 audit(1689233198.686:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12290 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629473.439893] audit: type=1326 audit(1689233220.626:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629546.455933] audit: type=1326 audit(1689233293.641:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629606.448034] audit: type=1326 audit(1689233353.633:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629607.009921] audit: type=1326 audit(1689233354.197:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5631 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629609.955561] audit: type=1326 audit(1689233357.141:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629627.321516] audit: type=1326 audit(1689233374.505:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629707.742545] audit: type=1326 audit(1689233454.929:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629850.465525] audit: type=1326 audit(1689233597.649:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=45171 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629868.399707] audit: type=1326 audit(1689233615.585:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44717 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629872.952680] audit: type=1326 audit(1689233620.137:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=52721 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630030.618773] audit: type=1326 audit(1689233777.805:1201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54149 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630045.395436] audit: type=1326 audit(1689233792.581:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630106.444998] audit: type=1326 audit(1689233853.629:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630109.684123] audit: type=1326 audit(1689233856.869:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630122.415862] audit: type=1326 audit(1689233869.601:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630133.035799] audit: type=1326 audit(1689233880.221:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630145.615898] audit: type=1326 audit(1689233892.801:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630159.315944] audit: type=1326 audit(1689233906.501:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=960226 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630160.574939] audit: type=1326 audit(1689233907.761:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630178.188428] audit: type=1326 audit(1689233925.373:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630208.508185] audit: type=1326 audit(1689233955.693:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63231 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630268.539316] audit: type=1326 audit(1689234015.728:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630294.692266] audit: type=1326 audit(1689234041.880:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630400.813582] audit: type=1326 audit(1689234148.000:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73111 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630430.900562] audit: type=1326 audit(1689234178.088:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630432.555274] audit: type=1326 audit(1689234179.744:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630472.924734] audit: type=1326 audit(1689234220.112:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630543.165758] audit: type=1326 audit(1689234290.352:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=77048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630592.902117] audit: type=1326 audit(1689234340.088:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=79980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630612.779733] audit: type=1326 audit(1689234359.968:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=71421 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630671.563741] exe[933990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.656538] exe[935243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e8f2858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.657094] exe[934183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.775717] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.796107] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.817615] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.838102] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.858928] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.879745] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.900515] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630686.088924] audit: type=1326 audit(1689234433.276:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=84298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630754.429805] audit: type=1326 audit(1689234501.616:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630797.015329] audit: type=1326 audit(1689234544.204:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630803.172429] audit: type=1326 audit(1689234550.360:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630803.316628] audit: type=1326 audit(1689234550.504:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630826.140992] audit: type=1326 audit(1689234573.328:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630828.789712] audit: type=1326 audit(1689234575.976:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630931.941194] audit: type=1326 audit(1689234679.128:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630960.968341] audit: type=1326 audit(1689234708.155:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630971.081558] audit: type=1326 audit(1689234718.267:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96327 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630993.604507] audit: type=1326 audit(1689234740.791:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631095.668165] audit: type=1326 audit(1689234842.855:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631128.093354] audit: type=1326 audit(1689234875.279:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631257.642898] audit: type=1326 audit(1689235004.827:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=105488 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631270.385609] audit: type=1326 audit(1689235017.571:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106057 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631419.419518] audit: type=1326 audit(1689235166.607:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631582.300448] audit: type=1326 audit(1689235329.487:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121859 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631624.654817] audit: type=1326 audit(1689235371.839:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631699.023697] audit: type=1326 audit(1689235446.210:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631736.259800] audit: type=1326 audit(1689235483.442:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125186 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11631759.179290] audit: type=1326 audit(1689235506.362:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126745 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631800.686165] audit: type=1326 audit(1689235547.870:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631856.695284] audit: type=1326 audit(1689235603.878:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=88236 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631900.127702] audit: type=1326 audit(1689235647.310:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631916.772415] audit: type=1326 audit(1689235663.954:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631942.479555] audit: type=1326 audit(1689235689.662:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632080.328408] audit: type=1326 audit(1689235827.514:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139436 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632164.881969] audit: type=1326 audit(1689235912.066:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632208.737639] audit: type=1326 audit(1689235955.922:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632215.574738] audit: type=1326 audit(1689235962.758:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=152768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632242.906806] audit: type=1326 audit(1689235990.090:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632259.274629] audit: type=1326 audit(1689236006.458:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632286.126517] audit: type=1326 audit(1689236033.310:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157913 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632408.470177] audit: type=1326 audit(1689236155.653:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146569 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632535.457323] audit: type=1326 audit(1689236282.641:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160861 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632540.257343] audit: type=1326 audit(1689236287.441:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168975 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632540.286544] audit: type=1326 audit(1689236287.469:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632542.632756] audit: type=1326 audit(1689236289.817:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158102 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632697.975936] audit: type=1326 audit(1689236445.157:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632735.256192] audit: type=1326 audit(1689236482.437:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154417 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632862.166502] audit: type=1326 audit(1689236609.349:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632869.895056] audit: type=1326 audit(1689236617.077:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=173000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633011.322614] audit: type=1326 audit(1689236758.505:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633014.331009] audit: type=1326 audit(1689236761.513:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159475 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633032.164525] audit: type=1326 audit(1689236779.345:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633074.646811] audit: type=1326 audit(1689236821.825:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=194947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633178.382123] audit: type=1326 audit(1689236925.568:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=193526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633210.844870] audit: type=1326 audit(1689236958.028:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196118 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633237.472180] audit: type=1326 audit(1689236984.656:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633320.216899] audit: type=1326 audit(1689237067.400:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633372.631508] audit: type=1326 audit(1689237119.816:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=218119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633442.080125] audit: type=1326 audit(1689237189.264:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=224638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633451.953592] audit: type=1326 audit(1689237199.140:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191551 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633534.694699] audit: type=1326 audit(1689237281.880:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633583.260228] audit: type=1326 audit(1689237330.444:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633605.153463] audit: type=1326 audit(1689237352.336:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633618.327114] audit: type=1326 audit(1689237365.512:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176708 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633674.629388] audit: type=1326 audit(1689237421.812:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633695.748765] audit: type=1326 audit(1689237442.932:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633775.199511] audit: type=1326 audit(1689237522.384:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633856.443829] audit: type=1326 audit(1689237603.627:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633857.100887] audit: type=1326 audit(1689237604.283:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248583 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633879.369215] audit: type=1326 audit(1689237626.551:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=262612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633894.013646] audit: type=1326 audit(1689237641.195:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=273812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11634019.963746] audit: type=1326 audit(1689237767.147:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=275224 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634029.100027] host.test[300842] bad frame in rt_sigreturn frame:000000009bf7b9ad ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [11634062.961914] audit: type=1326 audit(1689237810.147:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634077.117957] audit: type=1326 audit(1689237824.303:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000